Diff of the two buildlogs: -- --- b1/build.log 2025-03-07 09:44:34.212594501 +0000 +++ b2/build.log 2025-03-07 09:58:43.354347229 +0000 @@ -1,6 +1,6 @@ I: pbuilder: network access will be disabled during build -I: Current time: Thu Apr 9 04:05:20 -12 2026 -I: pbuilder-time-stamp: 1775750720 +I: Current time: Fri Mar 7 23:44:37 +14 2025 +I: pbuilder-time-stamp: 1741340677 I: Building the build Environment I: extracting base tarball [/var/cache/pbuilder/unstable-reproducible-base.tgz] I: copying local configuration @@ -24,52 +24,84 @@ dpkg-source: info: applying 01-test-failure.patch I: Not using root during the build. I: Installing the build-deps -I: user script /srv/workspace/pbuilder/1363228/tmp/hooks/D02_print_environment starting +I: user script /srv/workspace/pbuilder/2178243/tmp/hooks/D01_modify_environment starting +debug: Running on ionos1-amd64. +I: Changing host+domainname to test build reproducibility +I: Adding a custom variable just for the fun of it... +I: Changing /bin/sh to bash +'/bin/sh' -> '/bin/bash' +lrwxrwxrwx 1 root root 9 Mar 7 09:44 /bin/sh -> /bin/bash +I: Setting pbuilder2's login shell to /bin/bash +I: Setting pbuilder2's GECOS to second user,second room,second work-phone,second home-phone,second other +I: user script /srv/workspace/pbuilder/2178243/tmp/hooks/D01_modify_environment finished +I: user script /srv/workspace/pbuilder/2178243/tmp/hooks/D02_print_environment starting I: set - BUILDDIR='/build/reproducible-path' - BUILDUSERGECOS='first user,first room,first work-phone,first home-phone,first other' - BUILDUSERNAME='pbuilder1' - BUILD_ARCH='amd64' - DEBIAN_FRONTEND='noninteractive' - DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=42 ' - DISTRIBUTION='unstable' - HOME='/root' - HOST_ARCH='amd64' + BASH=/bin/sh + BASHOPTS=checkwinsize:cmdhist:complete_fullquote:extquote:force_fignore:globasciiranges:globskipdots:hostcomplete:interactive_comments:patsub_replacement:progcomp:promptvars:sourcepath + BASH_ALIASES=() + BASH_ARGC=() + BASH_ARGV=() + BASH_CMDS=() + BASH_LINENO=([0]="12" [1]="0") + BASH_LOADABLES_PATH=/usr/local/lib/bash:/usr/lib/bash:/opt/local/lib/bash:/usr/pkg/lib/bash:/opt/pkg/lib/bash:. + BASH_SOURCE=([0]="/tmp/hooks/D02_print_environment" [1]="/tmp/hooks/D02_print_environment") + BASH_VERSINFO=([0]="5" [1]="2" [2]="37" [3]="1" [4]="release" [5]="x86_64-pc-linux-gnu") + BASH_VERSION='5.2.37(1)-release' + BUILDDIR=/build/reproducible-path + BUILDUSERGECOS='second user,second room,second work-phone,second home-phone,second other' + BUILDUSERNAME=pbuilder2 + BUILD_ARCH=amd64 + DEBIAN_FRONTEND=noninteractive + DEB_BUILD_OPTIONS='buildinfo=+all reproducible=+all parallel=20 ' + DIRSTACK=() + DISTRIBUTION=unstable + EUID=0 + FUNCNAME=([0]="Echo" [1]="main") + GROUPS=() + HOME=/root + HOSTNAME=i-capture-the-hostname + HOSTTYPE=x86_64 + HOST_ARCH=amd64 IFS=' ' - INVOCATION_ID='4213a0a8d1fc44129c580a3d224589d7' - LANG='C' - LANGUAGE='en_US:en' - LC_ALL='C' - MAIL='/var/mail/root' - OPTIND='1' - PATH='/usr/sbin:/usr/bin:/sbin:/bin:/usr/games' - PBCURRENTCOMMANDLINEOPERATION='build' - PBUILDER_OPERATION='build' - PBUILDER_PKGDATADIR='/usr/share/pbuilder' - PBUILDER_PKGLIBDIR='/usr/lib/pbuilder' - PBUILDER_SYSCONFDIR='/etc' - PPID='1363228' - PS1='# ' - PS2='> ' + INVOCATION_ID=17907b36a632439b928344e45be1ff51 + LANG=C + LANGUAGE=et_EE:et + LC_ALL=C + MACHTYPE=x86_64-pc-linux-gnu + MAIL=/var/mail/root + OPTERR=1 + OPTIND=1 + OSTYPE=linux-gnu + PATH=/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path + PBCURRENTCOMMANDLINEOPERATION=build + PBUILDER_OPERATION=build + PBUILDER_PKGDATADIR=/usr/share/pbuilder + PBUILDER_PKGLIBDIR=/usr/lib/pbuilder + PBUILDER_SYSCONFDIR=/etc + PIPESTATUS=([0]="0") + POSIXLY_CORRECT=y + PPID=2178243 PS4='+ ' - PWD='/' - SHELL='/bin/bash' - SHLVL='2' - SUDO_COMMAND='/usr/bin/timeout -k 18.1h 18h /usr/bin/ionice -c 3 /usr/bin/nice /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.dL70r07i/pbuilderrc_y0Ya --distribution unstable --hookdir /etc/pbuilder/first-build-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.dL70r07i/b1 --logfile b1/build.log libjose4j-java_0.9.6-1.dsc' - SUDO_GID='110' - SUDO_UID='105' - SUDO_USER='jenkins' - TERM='unknown' - TZ='/usr/share/zoneinfo/Etc/GMT+12' - USER='root' - _='/usr/bin/systemd-run' - http_proxy='http://213.165.73.152:3128' + PWD=/ + SHELL=/bin/bash + SHELLOPTS=braceexpand:errexit:hashall:interactive-comments:posix + SHLVL=3 + SUDO_COMMAND='/usr/bin/timeout -k 24.1h 24h /usr/bin/ionice -c 3 /usr/bin/nice -n 11 /usr/bin/unshare --uts -- /usr/sbin/pbuilder --build --configfile /srv/reproducible-results/rbuild-debian/r-b-build.dL70r07i/pbuilderrc_92Oh --distribution unstable --hookdir /etc/pbuilder/rebuild-hooks --debbuildopts -b --basetgz /var/cache/pbuilder/unstable-reproducible-base.tgz --buildresult /srv/reproducible-results/rbuild-debian/r-b-build.dL70r07i/b2 --logfile b2/build.log libjose4j-java_0.9.6-1.dsc' + SUDO_GID=110 + SUDO_UID=105 + SUDO_USER=jenkins + TERM=unknown + TZ=/usr/share/zoneinfo/Etc/GMT-14 + UID=0 + USER=root + _='I: set' + http_proxy=http://46.16.76.132:3128 I: uname -a - Linux ionos5-amd64 6.12.12+bpo-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.12.12-1~bpo12+1 (2025-02-23) x86_64 GNU/Linux + Linux i-capture-the-hostname 6.1.0-31-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.128-1 (2025-02-07) x86_64 GNU/Linux I: ls -l /bin - lrwxrwxrwx 1 root root 7 Mar 4 2025 /bin -> usr/bin -I: user script /srv/workspace/pbuilder/1363228/tmp/hooks/D02_print_environment finished + lrwxrwxrwx 1 root root 7 Mar 4 11:20 /bin -> usr/bin +I: user script /srv/workspace/pbuilder/2178243/tmp/hooks/D02_print_environment finished -> Attempting to satisfy build-dependencies -> Creating pbuilder-satisfydepends-dummy package Package: pbuilder-satisfydepends-dummy @@ -432,7 +464,7 @@ Get: 307 http://deb.debian.org/debian unstable/main amd64 maven all 3.9.9-1 [19.7 kB] Get: 308 http://deb.debian.org/debian unstable/main amd64 maven-repo-helper all 1.11 [142 kB] Get: 309 http://deb.debian.org/debian unstable/main amd64 maven-debian-helper all 2.6.7 [108 kB] -Fetched 285 MB in 14s (20.1 MB/s) +Fetched 285 MB in 23s (12.3 MB/s) Preconfiguring packages ... Selecting previously unselected package libsystemd-shared:amd64. (Reading database ... (Reading database ... 5% (Reading database ... 10% (Reading database ... 15% (Reading database ... 20% (Reading database ... 25% (Reading database ... 30% (Reading database ... 35% (Reading database ... 40% (Reading database ... 45% (Reading database ... 50% (Reading database ... 55% (Reading database ... 60% (Reading database ... 65% (Reading database ... 70% (Reading database ... 75% (Reading database ... 80% (Reading database ... 85% (Reading database ... 90% (Reading database ... 95% (Reading database ... 100% (Reading database ... 19783 files and directories currently installed.) @@ -1899,7 +1931,11 @@ Building tag database... -> Finished parsing the build-deps I: Building the package -I: Running cd /build/reproducible-path/libjose4j-java-0.9.6/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games" HOME="/nonexistent/first-build" dpkg-genchanges -S > ../libjose4j-java_0.9.6-1_source.changes +I: user script /srv/workspace/pbuilder/2178243/tmp/hooks/A99_set_merged_usr starting +Not re-configuring usrmerge for unstable +I: user script /srv/workspace/pbuilder/2178243/tmp/hooks/A99_set_merged_usr finished +hostname: Name or service not known +I: Running cd /build/reproducible-path/libjose4j-java-0.9.6/ && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-buildpackage -us -uc -b && env PATH="/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/i/capture/the/path" HOME="/nonexistent/second-build" dpkg-genchanges -S > ../libjose4j-java_0.9.6-1_source.changes dpkg-buildpackage: info: source package libjose4j-java dpkg-buildpackage: info: source version 0.9.6-1 dpkg-buildpackage: info: source distribution unstable @@ -1976,8 +2012,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 5.380 s -[INFO] Finished at: 2026-04-09T16:06:45Z +[INFO] Total time: 01:09 min +[INFO] Finished at: 2025-03-07T09:55:42Z [INFO] ------------------------------------------------------------------------ dh_auto_test /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/build/reproducible-path/libjose4j-java-0.9.6 -Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/build/reproducible-path/libjose4j-java-0.9.6/debian/maven.properties org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml -Ddebian.dir=/build/reproducible-path/libjose4j-java-0.9.6/debian -Dmaven.repo.local=/build/reproducible-path/libjose4j-java-0.9.6/debian/maven-repo --batch-mode test @@ -2009,2507 +2045,2507 @@ [INFO] ------------------------------------------------------- [INFO] T E S T S [INFO] ------------------------------------------------------- -[INFO] Running org.jose4j.jwt.NumericDateTest -16:06:48.666 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} -16:06:48.668 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} -16:06:48.668 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} -16:06:48.668 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} -16:06:48.668 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} -16:06:48.668 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} -16:06:48.668 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} -16:06:48.668 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} -16:06:48.678 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT} -16:06:48.679 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54?AM GMT} -16:06:48.679 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} -16:06:48.679 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} -16:06:48.679 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} -16:06:48.679 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} -16:06:48.679 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} -16:06:48.679 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} -16:06:48.680 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05?PM GMT} -16:06:48.681 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06?PM GMT} -16:06:48.681 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 -16:06:48.681 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 -16:06:48.681 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 -16:06:48.681 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 -16:06:48.681 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 -16:06:48.682 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 -16:06:48.682 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 -16:06:48.682 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 -16:06:48.682 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 -16:06:48.682 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.176 s - in org.jose4j.jwt.NumericDateTest -[INFO] Running org.jose4j.jwt.JwtClaimsTest -[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.044 s - in org.jose4j.jwt.JwtClaimsTest -[INFO] Running org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest -16:06:48.775 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:48.777 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:48.783 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:48.783 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:48.784 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:48.786 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:48.788 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:48.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:48.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:48.801 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:48.801 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:48.801 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:48.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:48.802 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:48.804 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:48.806 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:48.807 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:48.807 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:48.810 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:48.810 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:48.817 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:48.818 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:48.820 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:48.821 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:48.821 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:48.823 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:48.826 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:48.828 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:48.829 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:48.830 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:48.831 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:48.831 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:48.834 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:48.835 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:48.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:48.836 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:48.836 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:48.837 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:48.837 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:48.838 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:48.839 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:48.840 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:48.840 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:48.841 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:48.841 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4e3958e7 registered for zip algorithm DEF -16:06:48.841 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:48.841 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 65ms -16:06:48.844 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] -16:06:48.910 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] -16:06:48.912 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] -16:06:48.915 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -16:06:48.915 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -16:06:48.916 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] -16:06:48.936 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] -16:06:48.937 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] -16:06:48.942 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.196 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest -16:06:48.963 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -16:06:48.963 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] -16:06:48.965 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -16:06:48.965 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -16:06:48.966 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:48.966 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:48.968 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:48.968 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:48.977 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:48.978 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:48.980 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -16:06:48.981 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] -16:06:48.986 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -16:06:48.987 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] -16:06:48.993 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -16:06:48.993 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.048 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest -16:06:49.007 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=TQt4ZBsYwlAIN6IEoFQsOg). -16:06:49.008 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vLUZof2UvVHjAn4rZLUgKg). -16:06:49.008 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vLUZof2UvVHjAn4rZLUgKg). -16:06:49.009 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=NqBTLo7VTPtjz13JO3V32Q). -16:06:49.009 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=NqBTLo7VTPtjz13JO3V32Q). -16:06:49.009 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=NqBTLo7VTPtjz13JO3V32Q). -16:06:49.010 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xRd36D827Ww8ejA8z8kyGQ). -16:06:49.010 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xRd36D827Ww8ejA8z8kyGQ). -16:06:49.010 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xRd36D827Ww8ejA8z8kyGQ). -16:06:49.010 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xRd36D827Ww8ejA8z8kyGQ). -16:06:49.011 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vN5nTdur5ffC9Q9_n8Vpsg). -16:06:49.011 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vN5nTdur5ffC9Q9_n8Vpsg). -16:06:49.011 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vN5nTdur5ffC9Q9_n8Vpsg). -16:06:49.012 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vN5nTdur5ffC9Q9_n8Vpsg). -16:06:49.012 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=vN5nTdur5ffC9Q9_n8Vpsg). -16:06:49.013 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=DZtkaPAtDyipmULXzIx7Fw). -16:06:49.014 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=DZtkaPAtDyipmULXzIx7Fw). -16:06:49.014 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=DZtkaPAtDyipmULXzIx7Fw). -16:06:49.014 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=DZtkaPAtDyipmULXzIx7Fw). -16:06:49.014 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=DZtkaPAtDyipmULXzIx7Fw). -16:06:49.015 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=DZtkaPAtDyipmULXzIx7Fw). -16:06:49.015 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..ZGT-AC88Du8LwCKc3vnnww.l4DWbjhWaPXmaldTno58UKWBlezDYDUBUuCAMhLc7x4.DZtkaPAtDyipmULXzIx7Fw] -16:06:49.148 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: A128KW key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: javax.crypto.IllegalBlockSizeException: Integrity check failed; caused by: javax.crypto.IllegalBlockSizeException: Integrity check failed). -16:06:49.152 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -16:06:49.152 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -16:06:49.153 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -16:06:49.223 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -16:06:49.223 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -16:06:49.236 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Message is larger than modulus). -16:06:49.245 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -16:06:49.246 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). -16:06:49.254 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -16:06:49.270 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). -16:06:49.271 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}]) selecting from keys: [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] -16:06:49.298 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] -16:06:49.299 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.289 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest -[INFO] Running org.jose4j.jwt.consumer.JwtConsumerTest -16:06:49.326 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39?PM GMT} is more than 60 second(s) in the past.] -16:06:49.329 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41?AM GMT} is more than 60 second(s) in the past.] -16:06:49.332 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45?AM GMT} is more than 60 second(s) in the past.] -16:06:49.334 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} is more than 60 second(s) in the past.] -16:06:49.337 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57?AM GMT} is more than 60 second(s) in the past.] -16:06:49.340 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24?PM GMT} is more than 60 second(s) in the past.] -16:06:49.342 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -16:06:49.345 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -16:06:49.348 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -16:06:49.350 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -16:06:49.357 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39?PM GMT} is more than 120 second(s) in the past.] -16:06:49.364 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51?PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] -16:06:49.368 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] -16:06:49.368 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -16:06:49.369 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] -16:06:49.369 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] -16:06:49.369 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] -16:06:49.369 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] -16:06:49.370 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -16:06:49.370 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -16:06:49.370 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -16:06:49.370 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] -16:06:49.371 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -16:06:49.371 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -16:06:49.372 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -16:06:49.372 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -16:06:49.373 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -16:06:49.373 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] -16:06:49.373 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -16:06:49.373 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] -16:06:49.763 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiMmpLVGg3R01JVTFRRGc3dnh3SzNYb2N1T3VEQ0d0ZlN0OVpacGVyUDhuOCIsInkiOiIwNWVyb2E3bXhlUjI4aGFNbEtwazQtaUtFUTc4R1NBXzdFVk5UejltWmFZIiwiY3J2IjoiUC0yNTYifX0.93ePbAUK9sYeNRJtm6ppydi809EXnYgvYddt4RGbtxrWBFhLI8aTSg.1o6S3x7u8zdcEn1SJZPuwg.LW3TTUPBoYQCU_1is_rbufRHsoe8w7QQen8VTWubz9y85Pz4F2rWjlaWMAP0cJeWKGH7M9tBUceGj4Bz6aMwww.MF9xyHj2kGhkb_L6i3_H0A Additional details: [[20] Missing Integrity Protection] -16:06:49.769 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJnMG5JVENrQThISnBXczJ1Tzh6SHBhekV2RDVHTTFubnZZSjhTbjZldHNrIiwieSI6IkUtTEtraGJ1OGF2UzFGOFJBYmExRGFqdWF6UlBXTkRXTVZLNzBkcFdGLWsiLCJjcnYiOiJQLTI1NiJ9fQ..a0r3zWK3-K01K3SqRqPgAg.lkBeuR4M3FtYyfbJeqa-vG-30JafXpfbwUZYiNiVmQhNdl6SSS86mdFd1TUvzynhZ7TH0hNpRwFqk79CH_tYNg._ldthiRq8jJRjQcEazFgcw Additional details: [[20] Missing Integrity Protection] -16:06:49.776 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiMW1QQUYtNnpwd1dYVXlVVS1kN1U1aVc0cU9YMlRuQ05Eb3E5a2FNaUdkOCIsInkiOiJFbjN6SG9FMzhsYzFacjhNYmIxd1lJNlRuY0s3ZUlzbi15NmZSSEdiei1BIiwiY3J2IjoiUC0yNTYifX0.fcFcRn7nI8hRNvn6STVi6HXZzDBWp-E6t9Mr0064wY1oL6i50J2TiY26-Yj3WwXpyQ0w8Kqf8yzHHz7-aiEV5Th8OLCrH-es.xP_i4uwF248cGk3tV2VBpw.9mZ8eN1viUqM0ThwmusSlyparatPwxOCsj04SwCL4FiRyX-lHK3v_s6Y-vFfeiCd30aDWoRv7XF_f11s-6yJiA.GNAtwWjZ0Wlu-90aKJji93ogYnSKpX8uC_KvrbpUgd0 Additional details: [[20] Missing Integrity Protection] -16:06:49.783 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiMkhlNm1famtHVkw5NHBiSGRqczZRUWlyMjk5WHlzVFJHLUNIbWgzWTdKZyIsInkiOiJ4cVJOVGluVVlWX3RPZndmOHY2LUtrb0FxMm1fbTN0dEFCeDNsOHFCdHkwIiwiY3J2IjoiUC0yNTYifX0.a9VhnVUHfAvU3SyEeBlkvcmOeIi1-jv3B40d1RpWZdm4kXR3kAtwb7hAGmnTX0zlsv3nmTveUS4.HjMqNRZ3w95HuTSEdMYaaw.CnKKw9B6AjyS-O80rD_ys3mRtEo-sob6DKDnDBFdRS9s4kpldJGF5SzS_ap-wbQPA6QB8uDhH-nmuFC0Ov80XA.Jh7DSmlvFkBsH4Yv3XA-ZUJO3xa-xVxX Additional details: [[20] Missing Integrity Protection] -16:06:49.788 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.XUuhzNVLgLRQ4fGPO-EeoTPZ5xz40PfQ1-qPejubHoK7fXFqQcuYgWoAFLWjo03q_LbLpa5VLzKg7Btj0QtkbArfA9MvfbiSc84KTJN7dirXcBGq2QruuBv6hQI4XYn2lIuxQJdCcwTROJFeVGO1GWhP1bY47mpjdgDSPIZYazYFoqr4LX0oS8q1QEDsQ-bk0OC3_pybuZg0ZtXrjD5YNSFoYpb7FVFtUOZ8p6B71g98Zr0cR9EJEW5Xz_o4ZO88ExtS5EdbDcNfHFgp0xVBNXyH2vuzfyOHZysnroThvUDZWkLeHnXL81oRBwznaoL4LD66blhuLQ5TwGQd-Pn1yA.ftHRfoM4zV0-SfV6D5O-1w.cTizwgWfFipM1l1slZjoFJnretpw0ma3sDlmYdxWpY-yInMiC-kJZES4fVmleCFOuG5EPPZqZ_SMJRORFfYujQ.hHwhxTKeAXkkabn7TPQabQ Additional details: [[20] Missing Integrity Protection] -16:06:49.791 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.E17K5rAxvfM-LdHTrgjgpLuT9Nx6kgaZgoK7-JvU1xufOJF7zGU7DrOpn1xCi0FP7ITulWXotFd0xbbmPtpwsK4zNyR6gE3jBkcT-G-9kxGfslx9pn2DRWTBdoJS2Etm10YwX9G2Kx6NlKlI4bq1LkqWTQveF1APHgueb-BfvFZO-kn8uqThmNMyARATvmj9tu4oElrFROeVnrXQeiF1b_MK-m2QMRcT3k8_D6yI03JamL4LRCf98dAeNxc506xYpWeYdeso8Q_gHZsgwuv3W32D6UL2g4_u2adLjwxQSUj-FoD2k8fF1eoLaN4xmK6B67dRbobcLoq0NiNO4ymmOA.qmvASbodSH0_diQzrv9uhg.BFklxKfHYu-eMrnQ8Xy1sXak4RCPgg_4qC2eh9h2vkgQ5d0E0u7OgKeIfXTwVwGhor8HKX-98ev-ODteE-Q_HQ.sdsTWbDWhwq3wbV7cnMuJ9aGGkae3tQk Additional details: [[20] Missing Integrity Protection] -16:06:49.794 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.AKgYMYdalFGJVV8QgksXb5UvknqGJR-fbIbYBsuDisZsCErQxSu6hO3zlhR-2OTcFNANxtmoA2FQVhPB-1wY7d8A4LJAvf7-ZJb71rL55yza3fNB2kH2JU2U2zSEuRxekTC8lUZmzFTdEtzSy9pGP1yruQI8BzMSRTbBCah5a6k4Paf-At3F2sjbuxJdOuoP2UFcT7SVFGJdKThYDEzxVQ8v1cmbySFF_-Jino-t0VpCefdVod1MQEzjXrAH82erpJkRr66ZtUQ_zSa5WWxHSDZ0IcUYAyhwcdEJgDN98iCvMz0IIARpfE_Yozgde74CtO_7r2YDZ3DB9Hjd5eTRbQ.bUWtS4ZHetbGAg0hGg9M8A.bLDXTfysUcnYXoz3b6Ho2rfbNyXGFO4ve5Gy3MeK0FVI7YPzeg4JedTFlE41xEv90bQ8yAmlT9gWbND0y0-zag.O2LN6AueHpPo_uD8wOTd8WIsFWJ3MBr_Lys-xnB3Kz8 Additional details: [[20] Missing Integrity Protection] -16:06:49.795 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=Af9BOR9099Hw8shDgs4TvNebVDqlCQqgIX1Kh8dJtp7F0DIbrdZTc0DeWmsZYg5s3r2mYsmKm76V0nI729V7cY4z, y=ASorwN9dh41U5toJvWs7HCg32yAmc54JbeA0rMxcFaMxMjcupwrAmzzytLY8OBy3_NolqBfz3czpYNZ-UaFTFKun, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=NLZYPza9sjyo0vyPVrjbXd6G4CYoXV2JIx1JStVaPS8, y=6xJu_e5HEtEkw5HF0q54p1LfTiLb882fYSI-4tFMxSQ, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=sfEE61G_LJz8LcdV15wQjgR6gzxUi-h3wi_1nYFsuujtNUGyCDfv2ppPhucIJQxnpr4uxkYhnpFWvGLsOnF3_3M4sVlkc2ER-8Ff2NvqEEBfATNCOt0ZrGJrK_VFe2-wHjrxQQnRtcUF9JTdvfO99hLYnxaQZWcznthOxpQln6Y2XI4juQY0_vBS-6RiqKwouvp9oxZm3bu5Ey12mrBrWLLsaFC5mf5dtxM2FS4v5QA7H4YwTPc6CqS60i3oWGMLGy-j35ZysH7GFCopUO9_hYZLT5eoiraQY3Ld7iPOQ9hz_IlwegUvXCwaxkn4w0pip-MJnSV5hGD_ZKSFhlJX7w, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=waeynT7W_ol9EUyNGJmHPZEsUqrcvb9nV3wWDlFOftopsSr8S94BCQ8twrMSB9Gf, y=KCYdXSIjZD-NY9lRUCuQxwo_1SEitgRsgUArDtD6cfRjyu37_L18yi2ULW967s8u, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=8aJqF80vPah9KEbsVg89l4VhSxm66rajkyN9eWboUzfYBc6OyMmG6OC57QFyERZpjaYvUw_gV6fqb6m6CujnucxZF69Zn5pw5Y7wg_R2ddZOM_gDEdRo530lECRaFYYP9dYP-LLGHf2EXfdmFs1giz8f4ZS4PvKfG1WiVOPOvBK28iAy5_bP7RcBAqbz0SE8AlypqruLdwSn6ITAFKwo9RH9F9VEZjayESfVbXqKj6hr0yG0RE0av7Sfyc-nQKZio50RKXiOskZJjWOZUhy-D7lttTgT6jJaCab3q_YcBpB3uYVsuebzILkUE39TDi5xkDJ-LTu77j36a2tYwNt5XQ, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTc3NTc1MTQwOSwic3ViIjoicyJ9.FPNdz9C1JJkUlljJOFnbvQmTYLd0LVYswXGDdmLyuJ4] -16:06:49.796 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.4Yac62gWX8lgkBlJO5veCVOkJiXY6DVwlScAitIS3m09wgAeC8yAQPZCWAYvaDQadWwgf5uf_GHIM8Tl3KaguVjvTaWPHclvpgz35w_KlmUy0qysYYrhNP7KIuyBQGWAfk6eV2lk4dlJiLis67A7AqrCSOhhB91oe_bEc8PX019MHIDyFhkc-oODB0p7tpR5y3_YTsQ9LQg8dLL1YbcjQ9Qh7ELFb0L5TLCU3fgzW5Ef1J5Z19K0iyl5A5Rdp6nZufy3Sbv7pSfbpsomiYLIDLBMBUiWuLZeg6JEJgG9-JUxfil5I-ABzE_n4Mo1QTJFWmrGAx41f5dYIrZPKSQIOQ.G1XgpGRBhxnPspVMrVbieg.fsCzRPTJQsmoCc7o40Fs1boy1egGL_j-UWsshaQcqInkFwUZDR-_-RYt-14DlO2Bu7wH50Gio3f5ftIWYzRI1Q.1CXxflzjnod1E6Ih7KkYnw] -16:06:49.798 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.4Yac62gWX8lgkBlJO5veCVOkJiXY6DVwlScAitIS3m09wgAeC8yAQPZCWAYvaDQadWwgf5uf_GHIM8Tl3KaguVjvTaWPHclvpgz35w_KlmUy0qysYYrhNP7KIuyBQGWAfk6eV2lk4dlJiLis67A7AqrCSOhhB91oe_bEc8PX019MHIDyFhkc-oODB0p7tpR5y3_YTsQ9LQg8dLL1YbcjQ9Qh7ELFb0L5TLCU3fgzW5Ef1J5Z19K0iyl5A5Rdp6nZufy3Sbv7pSfbpsomiYLIDLBMBUiWuLZeg6JEJgG9-JUxfil5I-ABzE_n4Mo1QTJFWmrGAx41f5dYIrZPKSQIOQ.G1XgpGRBhxnPspVMrVbieg.fsCzRPTJQsmoCc7o40Fs1boy1egGL_j-UWsshaQcqInkFwUZDR-_-RYt-14DlO2Bu7wH50Gio3f5ftIWYzRI1Q.1CXxflzjnod1E6Ih7KkYnw Additional details: [[20] Missing Integrity Protection] -16:06:49.804 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -16:06:49.804 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] -16:06:49.805 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -16:06:49.805 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -16:06:49.805 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] -16:06:49.805 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -16:06:49.805 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] -16:06:49.806 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] -16:06:49.806 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] -16:06:49.806 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] -16:06:49.806 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -16:06:49.806 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] -16:06:49.808 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] -16:06:49.808 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] -16:06:49.809 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] -16:06:49.809 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] -16:06:49.810 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] -16:06:49.814 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] -16:06:49.854 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1775750749,"sub":"s","nbf":1775750629}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1775750809 -> Apr 9, 2026, 4:06:49?PM GMT} is on or after the Expiration Time (exp=NumericDate{1775750749 -> Apr 9, 2026, 4:05:49?PM GMT}) claim value.] -16:06:49.855 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1775750749,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1775750809 -> Apr 9, 2026, 4:06:49?PM GMT} is on or after the Expiration Time (exp=NumericDate{1775750749 -> Apr 9, 2026, 4:05:49?PM GMT}) claim value.] -16:06:49.856 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1775752009,"sub":"s","nbf":1775751049}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1775750809 -> Apr 9, 2026, 4:06:49?PM GMT} is before the Not Before (nbf=NumericDate{1775751049 -> Apr 9, 2026, 4:10:49?PM GMT}) claim time.] -16:06:49.864 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] -16:06:49.868 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] -16:06:49.871 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] -16:06:49.874 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] -16:06:49.877 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] -16:06:49.880 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT}.] -16:06:49.886 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -16:06:49.891 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -16:06:49.897 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -16:06:49.900 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] -16:06:49.903 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] -16:06:49.952 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -16:06:49.952 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] -16:06:49.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1775750749,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1775750809 -> Apr 9, 2026, 4:06:49?PM GMT} is on or after the Expiration Time (exp=NumericDate{1775750749 -> Apr 9, 2026, 4:05:49?PM GMT}) claim value.] -16:06:49.967 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] -16:06:49.968 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] -16:06:49.968 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] -16:06:49.969 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] -16:06:49.974 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1775751409,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] -16:06:49.975 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1775751409,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] -16:06:49.976 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1775751409,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1775751409 -> Apr 9, 2026, 4:16:49?PM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1775750809 -> Apr 9, 2026, 4:06:49?PM GMT}.] -16:06:49.976 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3NzU3NTE0MDksImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] -16:06:49.982 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.AlP2Nxahf1_HLjc0lx9-Ttz513LbzX3LiD2C7CLsmQMkASqbOgZfi0ZtkBs__RglqFUWc3JS5mkvCi9MoBVhU0tF2t-NhRsCfjf9YrDja3j38RwsQRnZOOphGZw3jy0Zc8az7X8o-DYHBp1KPwjegW6zTBmoSGGoBJU8P813EmCtGdX6GohoHZE_sliCRbz2OpIYXtL1lsp2O0TMhjqYT94XAYcoPfkUmn0ElkISZl294OLTF8bxGPvjt-b-_zcB5zfaQF74PvQNTO4xQGFpSbp-wuFtGSGm4ojg0qVU7wjexODOyEPJHFP6Pjs6I5kCdfI23DVPaVVN3ofxwhR91A.g3kt5VH38Z3pgkquewyTZA.yfFuyBjf1olJ-fw4roRAg9XgNuqvfG3rMzGryn_Zgv5GGlDtpfq4AZ0qc6OeKzfcKvM45hUfxOEuuD4RxlxrUw.PLgzZKmCGRzusqOxlpimzQ Additional details: [[10] Missing signature.] -16:06:49.984 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -16:06:49.984 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] -16:06:49.990 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] -16:06:49.993 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] -16:06:49.995 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] -16:06:49.998 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] -16:06:50.001 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] -16:06:50.004 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] -16:06:50.007 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -16:06:50.010 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] -16:06:50.010 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] -16:06:50.011 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] -16:06:50.016 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -16:06:50.016 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -16:06:50.016 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -16:06:50.016 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] -16:06:50.016 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] -16:06:50.017 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"129ffs904","iss":"I?m sorry, this is our family?s first kidnapping.","aud":"ap.io/","exp":1702498218}] -16:06:50.017 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"jwt"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"1234","iss":"abcd","aud":"https://example.com/as","iat":1702497918,"exp":1702498218}] -16:06:50.018 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"0","iss":"ctyortyp","aud":"audiencia","exp":1702498218}] -16:06:50.018 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"2","iss":"ctyortyp","aud":"to.whom.it.may.concern","exp":1702499888}] -16:06:50.018 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JwT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"42","iss":"ctyortyp","aud":"to.whom.it.may.concern...","exp":1702599888}] -JWT Claims Set:{exp=1775751110, sub=subject, iss=issuer} -16:06:50.020 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] -16:06:50.020 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] -16:06:50.020 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] -16:06:50.021 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -16:06:50.022 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -16:06:50.022 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] -16:06:50.023 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] -16:06:50.023 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] -16:06:50.024 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] -16:06:50.025 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39?PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim time.] -16:06:50.025 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20?PM GMT}) claim value.] -16:06:50.026 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40?PM GMT}) claim value.] -16:06:50.027 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] -16:06:50.028 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] -16:06:50.029 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc3NTc1MTExMCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -16:06:50.030 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc3NTc1MTExMCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] -16:06:50.047 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -16:06:50.047 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -16:06:50.047 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -16:06:50.048 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", - "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -16:06:50.049 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -16:06:50.049 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] -16:06:50.055 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -16:06:50.055 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] -16:06:50.059 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -16:06:50.059 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] -16:06:50.069 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -16:06:50.069 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -16:06:50.070 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -16:06:50.070 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -16:06:50.070 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -16:06:50.070 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -16:06:50.070 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -16:06:50.070 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -16:06:50.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -16:06:50.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -16:06:50.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -16:06:50.071 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] -16:06:50.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -16:06:50.072 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] -16:06:50.076 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] -JWT Claims Set:{sub=me, aud=a, iss=i, exp=1775751410} -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.TXNwGvP2-h_Z3RzZCnpSv7YFB2mGmPgpCeDZs3OgQSPMrP4aEMOxw63rfycvoWV4t1aJYhwIfBxFufimHDqh5pfbyOQCgTV5iRG22yIfvNIsS-uqQje6c91WgCX68QQb66b4j2HStg-6WvtyBFAmF2jljV8s3IP5r1mzoUJ7GBsz3LBeMUYLL0llyc2OyFm80keOt7rmfAsmRZjYqJdj_An0n_5hkyRrK4n2ViETGL-oXa00GJrvuDEz1WfPNCdF0gV6gWz54i2SgPsVrD5vji2h724DSJJgbR7hilVpIWYdyMU6T-jqvvLDRbX2fFIYCYSaapFAdd7Aui56HH7e-g.73Ai2iQBwAPxIYZIgRgssw.ZdNtgV81nPcmBr5_9f-A6MTF5fFYnMWg8SorijZ_oon9qKJCAkktU5MGUxdonLK489z7iMIBiJ27zPwWroCf8xbnuUnWLGhYGrBsT6O5lz1LHtaWiPoMJCX9orEEl1VgU90Z3Z0L7MOVopxt6ZW7l4_2DVJv6fyT_N3VrLE5OlOXAmwCcA-AltTHltnL1YXKK0318Fz2Vi_m5H_obiGQvIp_dSk-NGkll4ID7fzLb-aVFPgmYeO9GCJd7SQvkCim6Ev1Uz0A4UlWxbWBmpiQMQ.k8dOi6BZGug5o10nC__UXw -16:06:50.082 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.TXNwGvP2-h_Z3RzZCnpSv7YFB2mGmPgpCeDZs3OgQSPMrP4aEMOxw63rfycvoWV4t1aJYhwIfBxFufimHDqh5pfbyOQCgTV5iRG22yIfvNIsS-uqQje6c91WgCX68QQb66b4j2HStg-6WvtyBFAmF2jljV8s3IP5r1mzoUJ7GBsz3LBeMUYLL0llyc2OyFm80keOt7rmfAsmRZjYqJdj_An0n_5hkyRrK4n2ViETGL-oXa00GJrvuDEz1WfPNCdF0gV6gWz54i2SgPsVrD5vji2h724DSJJgbR7hilVpIWYdyMU6T-jqvvLDRbX2fFIYCYSaapFAdd7Aui56HH7e-g.73Ai2iQBwAPxIYZIgRgssw.ZdNtgV81nPcmBr5_9f-A6MTF5fFYnMWg8SorijZ_oon9qKJCAkktU5MGUxdonLK489z7iMIBiJ27zPwWroCf8xbnuUnWLGhYGrBsT6O5lz1LHtaWiPoMJCX9orEEl1VgU90Z3Z0L7MOVopxt6ZW7l4_2DVJv6fyT_N3VrLE5OlOXAmwCcA-AltTHltnL1YXKK0318Fz2Vi_m5H_obiGQvIp_dSk-NGkll4ID7fzLb-aVFPgmYeO9GCJd7SQvkCim6Ev1Uz0A4UlWxbWBmpiQMQ.k8dOi6BZGug5o10nC__UXw] -16:06:50.092 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1775750810 -> Apr 9, 2026, 4:06:50?PM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55?PM GMT}) claim value.] -16:06:50.092 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] -16:06:50.093 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] -16:06:50.093 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] -16:06:50.093 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] -16:06:50.105 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1775751410,"nbf":1775750510,"jti":"kdVCg1AhXgTz81nlYNEx_A"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -16:06:50.114 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1775751410,"nbf":1775750510,"jti":"kdVCg1AhXgTz81nlYNEx_A"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] -16:06:50.127 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1775751410,"nbf":1775750510,"jti":"kdVCg1AhXgTz81nlYNEx_A"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] -16:06:50.135 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1775751410,"nbf":1775750510,"jti":"kdVCg1AhXgTz81nlYNEx_A"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -16:06:50.137 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1775751410,"nbf":1775750510,"jti":"kdVCg1AhXgTz81nlYNEx_A"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] -16:06:50.145 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1775751410,"nbf":1775750510,"jti":"kdVCg1AhXgTz81nlYNEx_A"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -16:06:50.147 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1775751410,"nbf":1775750510,"jti":"kdVCg1AhXgTz81nlYNEx_A"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] -[INFO] Tests run: 49, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.837 s - in org.jose4j.jwt.consumer.JwtConsumerTest -[INFO] Running org.jose4j.jwt.consumer.TypeValidatorTest -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.151 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.152 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.153 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -16:06:50.154 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. -16:06:50.155 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ -16:06:50.156 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwt.consumer.TypeValidatorTest -[INFO] Running org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest -16:06:50.160 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.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_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest -[INFO] Running org.jose4j.examples.ExamplesTest -eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.zvJpFFla7wlI5NWQWkKTyksBr0J-vluhdJu4Woyy2_cS7uSs0WBZxpnl1aGCki6LjA0wPni77Xrq9wvzhHCFmw -JWS Signature is valid: true -JWS payload: PAYLOAD! -Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.Ue_RWKvETME2sTefnDCzDyXv1VlAf0BKxGIZPA0EjbVuMmDVRIJfng.mqE-1GFKzi0OM2BTV0FUBw.TDgXr8BFGhcYFaEoggDhLQ.8SHuAS2twvPpIPkC4B1iyg -Payload: Hello World! -JWS Signature is valid: true -JWS payload: This is some text that is to be signed. -JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTc3NTc1MTQxMCwianRpIjoiMGdFd3ZadFM5QTB6UWFPUEJ3T3BjdyIsImlhdCI6MTc3NTc1MDgxMCwibmJmIjoxNzc1NzUwNjkwLCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.OVvNmUss5vLRe6rwucD4aq3hlrllCvaKXHg1IAHP-1wPipmvGX7qVh5yR658EH-CHql-S25nCn08n1CdnXw9gTq78xnKvAFj8KJOhL8GiYJs_5hwewTmppcPMI1s-RjReh4nqcixsA4ULfoQVhBSCY5Np03qJ4Z6stvWyOqzBJqqI9AobZmE4F3mz6UoYTH6ewWHZF0tnW56DsXPVQ_VsRbbYab2lqMS6-h2TmSmI3xwziECUKts5iuIuJxycMx6XqbvacMdyitxamE_a9JOMgy7R2ibA31Q1uISVjn3Zx4hK0gETmL-JHYhXWlJwoAhPoYcXoTULIPB36BelXAGSg -JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1775751410, jti=0gEwvZtS9A0zQaOPBwOpcw, iat=1775750810, nbf=1775750690, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} -JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJTZzBNX19mRVA0LUFfS3ZaYVgtcEVOczFRbkpWdlZ4UmE1cnpkMUNlbkhRIiwieSI6IklvNFdjZHhZTFlVOVNZdk5tcVJRVFBsc19FbVdRUm9IY01FbmdEMk1IVjgiLCJjcnYiOiJQLTI1NiJ9fQ.pi9C694GJW8dm8hWukuRcZ6_Grt9bhP7SKp3ah36mQYCtIkRI29-fg.2b0E1BLThQ5dcfAjNlohBw.RbY6loCZQ8u5U76HM-yAjh1thiR8o5wFCBgAPtfWmu9UwZck6v95FJR8GPFsoBdQMfnE7sQSwBsPSAQADvBEk9GWWGBPAJ1meo7G13YxcNSwwVtkqm7dRKVIdbLsLdGQ1SE0T-ehtvIyibwdaxFRLmDn3JtITR_jOzcAesnTydz51zlfBmvOX2qYam6JTZmqtuoaRCdEBPr5yF7AXJvb8-lS7Mqoo0rOUEiU8OtMW0D1VHwhfOY0pKsrRo_ClCrsAC5J7zcXJqtkjL3xa6QcD3l5dj4fR215FLpze4W6WNj_cILgESq990b59OAXHgnPgiED-HyzaeM9iZhSgGW4TdSpMovWJkd63EkZKru6FloWgrl8XHnKFRlndUkMgc9voDNVHFL1al_Zms7ShH2b6FM2hDrr4qwX_qnR9xhlmGUBJ5_VHEbZJ9PGzQIAQXVrTKgBq8BW-d8KZ6w7XfwnETI2HtDtfk4gmRC7Eg6KzA-DI157pOTF8BoyVk40nwaEMyG5sjkep52dZNwA-73PK0Nlq3gxxTcA9u58bJFTPZ8.pSzwJDZpvi6beRZn78SuCA -JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1775751410, jti=A1ccYRxFPV_X_G7a93cyig, iat=1775750810, nbf=1775750690, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} -JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..0VHF8NJXQ17wsL5W9SKg0w.C2vfJA8l5RFaNzKrEm_ulNSYlQfqfJ787XSEHeiXSBDFr7vYqvH2-LWw77rgyBtFrs1JEGMogKB--qh8Nsm60w.oIkPHhjROYO27B9wwge2Uw -plaintext: Well, as of this moment, they're on DOUBLE SECRET PROBATION! -eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..ZDTDqIy1fKJZzGR2yugYP1F-ZVk-0WKXuDmMlFMbl3f3wF6_uMANYt1lS8VpC-Qnny8oXOm9J7fSF17ripcziQ -this is the content that will be signed -JWS Signature is valid: true -JWT: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6InJlY2VpdmVyIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiY0RoSFY0RmdTU3U0dDdNemRiZm85RkV0bEZ4bGtsbmZhbjdrYTd1cVZscyJ9fQ..jnf9YNVqgApQVSIEP1Lp5A.VimzAMedsOUGAkP0JARWQLkulr5bdNmdkYgAvkq2Zp1v5QAOW8g7wcvwioxVefMjunCkHyh5hY9FVKEK15EZpIED5CGik8NR_bHaolOFX-WUkJYj_AmLw8GCuWV4hXUfb_s83e9NFIYq0PlLQERefM2JZgwbdmA3xt68G-EYrPtkRxIw8eItZpp96oAUIoCPt4Oyuc_G8yRmhWjCFtt3MARzblgyQZs5fhhVmBTdkZ1SPV6ucUjjlWLi2zZa5-x7n_kqu0gSjsP1DdHo7PCYMoZuXm_54QvjzOiFIk4Y3OraHDwpZGIU-eM4Ck5nU9bKRHvNd4_NmcYVYa3x-m0-HyYiCMt5slEOWXP_QRCNpRmc44wzqTJxWgyKm36HRc1P4Oz_BHYLSruaVd5gNa_yz_HdiW0ucjMzpE0apAfhgdMxfabvhXSfRQ0u95_9zjF3kNVvdpuMyiJOJlJGqZRS7XEV0aOPhbyT7ZduxDquaUDs731JP9p8DOwfOND8tz_IK9ESspp5MqGdfaixIzNhgRwtshspQwTmleqtN7xrdnkldSvb_WauN8egO-DrzlHqYcoQIoRaDuNdiTqBwO3B7l38apcIKn-n2VidLtwGjxbZe8SMAUknbnxgKNRbnniKc1qDRC5ejPNaMBpmiM-AUOBHhGIr61v2_qQDTByY7RtJdmENiNtZOwp6Hy8wi8300yMAr93h45gbRZlHmU_eTg.orKHgPZbthosEQdVo2LaQA -JWT validation succeeded! {"iss":"sender","aud":"receiver","exp":1775751410,"jti":"gce8oT5vT6WsXj2QATUNxw","iat":1775750810,"nbf":1775750690,"sub":"subject","email":"mail@example.com","groups":["group-1","other-group","group-3"],"address":{"street_address":"123 Main St","locality":"Anytown","region":"Anystate","country":"US"}} -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.207 s - in org.jose4j.examples.ExamplesTest -[INFO] Running org.jose4j.keys.EllipticCurvesTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.keys.EllipticCurvesTest -[INFO] Running org.jose4j.keys.KeyPairUtilTest -16:06:50.385 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): -eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3NzU3NTIwMTAsImp0aSI6InNSS2oyUHpLY09oekVDRXplbXlTNlEiLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.f8AJIRFGHYhjVllicj3aZCa12ZV1vsUey1PChqsLKzkiyRulsrc0bR3r8cUejJR0vCJbsL01Myrbo_0cwSksv0S3ru4hf3wGudAdiDWhhkQcBmj4mzJbt_X-nqn9qvu_2OdqnEMpykR-Yl05uRur5VtEsxfBD8CKs6QrBJxDSfDMYlcBrP8lQZxN5S3vvJMCiudxJN_QVqeJsvI_fcNhUpoc2rSZeRSsT7juankQM45f0fODmEwkhJ0Wsjvh_hUEGe3W-Trm4Ww6dzl1TSfutaPnsGqrvdDkAGQPvdZnSNppBlJPbJTmqXjaNkZ6IE9V2ejYYPY7D2dtnDpAlKMMFg ------BEGIN PUBLIC KEY----- -MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoahUIoWw0K0usKNuOR6H -4wkf4oBUXHTxRvgb48E+BVvxkeDNjbC4he8rUWcJoZmds2h7M70imEVhRU5djINX -tqllXI4DFqcI1DgjT9LewND8MW2Krf3Spsk/ZkoFnilakGygTwpZ3uesH+PFABNI -UYpOiN15dsQRkgr0vEhxN92i2asbOenSZeyaxziK72UwxrrKoExv6kc5twXTq4h+ -QChLOln0/mtUZwfsRaMStPs6mS6XrgxnxbWhojf663tuEQueGC+FCMfra36C9knD -FGzKsNa7LZK2djYgyD3JR/MB/4NUJW/TqOQtwHYbxevoJArm+L5StowjzGy+/bq6 -GwIDAQAB ------END PUBLIC KEY----- -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.keys.KeyPairUtilTest -[INFO] Running org.jose4j.keys.X509UtilTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.keys.X509UtilTest -[INFO] Running org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest -16:06:50.839 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -16:06:50.841 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ -16:06:50.845 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -16:06:50.845 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -16:06:50.845 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Thu Apr 09 17:06:50 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -16:06:50.851 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -16:06:50.852 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -16:06:50.852 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -16:06:50.852 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Thu Apr 09 17:06:50 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -16:06:50.860 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -16:06:50.860 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -16:06:50.860 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -16:06:50.860 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Thu Apr 09 17:06:50 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -16:06:50.865 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -16:06:50.865 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -16:06:50.865 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -16:06:50.865 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -16:06:50.865 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Thu Apr 09 17:06:50 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] -16:06:50.866 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ -16:06:50.866 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -16:06:50.867 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -16:06:50.867 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Thu Apr 09 17:06:50 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -16:06:50.867 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] -16:06:50.867 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -16:06:50.867 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -16:06:50.867 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Thu Apr 09 17:06:50 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -16:06:50.868 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -16:06:50.868 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ -16:06:50.868 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ -16:06:50.868 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Thu Apr 09 17:06:50 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] -16:06:50.868 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ -16:06:50.869 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ -16:06:50.869 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ -16:06:50.869 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Thu Apr 09 17:06:50 GMT 2026 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] -16:06:50.872 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.473 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest -[INFO] Running org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest -16:06:50.875 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] -16:06:50.875 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest -[INFO] Running org.jose4j.keys.BigEndianBigIntegerTest -[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.09 s - in org.jose4j.keys.BigEndianBigIntegerTest -[INFO] Running org.jose4j.json.JsonUtilTest -{"char array":["a","\\","\""],"some object":"java.lang.Object@16fe9c29","nested":{"chars":["\"","m","e","h"]},"nested also":{"obj":"java.util.Random@3e9803c2"}} -16:06:50.974 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') -16:06:50.975 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') -16:06:50.975 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') -16:06:50.975 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') -16:06:50.975 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.json.JsonUtilTest -[INFO] Running org.jose4j.jwa.AlgorithmConstraintsTest -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwa.AlgorithmConstraintsTest -[INFO] Running org.jose4j.jwa.AlgorithmFactoryTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwa.AlgorithmFactoryTest -[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwk.EcJwkGeneratorTest -[INFO] Running org.jose4j.jwk.JsonWebKeySetTest -16:06:50.996 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.InvalidKeyException: "NOPERS" is an unknown or unsupported value for the "crv" parameter.). JWK params: {kty=EC, crv=NOPERS, kid=iRTU, x=tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY, y=2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -16:06:50.997 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String.). JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -16:06:50.997 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String.). JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -16:06:50.997 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -16:06:50.997 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -16:06:50.997 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String.). JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -16:06:50.997 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. -[INFO] Tests run: 10, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jwk.JsonWebKeySetTest -[INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest -16:06:51.016 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:51.016 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:51.016 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:51.017 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:51.017 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:51.017 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:51.018 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:51.027 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:51.027 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:51.028 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:51.133 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:51.136 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:51.136 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:51.137 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:51.140 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:51.143 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:51.145 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:51.145 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:51.148 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:51.149 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:51.158 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:51.158 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:51.160 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:51.161 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:51.161 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:51.167 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:51.172 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:51.177 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:51.182 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:51.182 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:51.182 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:51.182 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:51.192 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:51.192 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:51.193 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:51.193 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:51.193 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:51.193 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:51.193 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:51.193 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:51.194 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:51.194 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:51.194 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:51.194 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:51.194 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@21618fa7 registered for zip algorithm DEF -16:06:51.194 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:51.194 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 178ms -16:06:51.196 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:51.196 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:51.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:51.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:51.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:51.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:51.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:51.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:51.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:51.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:51.197 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:51.197 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:51.197 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:51.197 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:51.197 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:51.197 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:51.197 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:51.198 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:51.198 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:51.198 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:51.198 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:51.198 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:51.198 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:51.199 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:51.199 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:51.199 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:51.200 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:51.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:51.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:51.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:51.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:51.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:51.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:51.203 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:51.203 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:51.203 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:51.203 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:51.203 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:51.203 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:51.203 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:51.203 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:51.203 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:51.203 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:51.204 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:51.204 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:51.204 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@37191ef0 registered for zip algorithm DEF -16:06:51.204 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:51.204 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 8ms -16:06:51.204 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. -16:06:51.222 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 -16:06:51.224 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 -[INFO] Tests run: 23, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.227 s - in org.jose4j.jwk.VerificationJwkSelectorTest -[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwk.DecryptionJwkSelectorTest -[INFO] Running org.jose4j.jwk.JsonWebKeyTest -[INFO] Tests run: 13, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwk.JsonWebKeyTest -[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.RsaJsonWebKeyTest -[INFO] Running org.jose4j.jwk.ExtraJwkParametersTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.ExtraJwkParametersTest +[INFO] Running org.jose4j.jca.ProviderContextTest +09:56:20.135 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:56:20.195 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:56:20.360 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:56:20.362 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:56:20.383 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:56:20.413 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:56:20.496 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:56:20.499 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:56:20.501 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:56:20.828 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:56:20.828 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:56:20.829 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:56:20.830 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:56:20.852 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:56:20.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:56:20.890 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:56:20.923 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:56:20.924 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:56:20.956 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:56:20.958 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:56:21.127 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:56:21.143 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:56:21.177 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:56:21.199 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:56:21.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:56:21.232 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:56:21.289 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:56:21.324 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:56:21.351 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:56:21.364 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:56:21.380 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:56:21.381 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:56:21.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:56:21.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:56:21.450 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:56:21.458 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:56:21.460 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:56:21.462 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:56:21.471 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:56:21.474 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:56:21.499 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:56:21.502 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:56:21.507 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:56:21.509 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:56:21.509 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6cb107fd registered for zip algorithm DEF +09:56:21.509 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:56:21.510 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 1342ms +09:56:21.510 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:56:21.510 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.8] security providers installed)... +09:56:21.523 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:56:21.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:56:21.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:56:21.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:56:21.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:56:21.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:56:21.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:56:21.525 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:56:21.526 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:56:21.526 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:56:21.539 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:56:21.540 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:56:21.540 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:56:21.576 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:56:21.604 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:56:21.633 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:56:21.634 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:56:21.647 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:56:21.648 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:56:21.701 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:56:21.702 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:56:21.711 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:56:21.712 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:56:21.712 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:56:21.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:56:21.878 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:56:21.949 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:56:22.254 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:56:22.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:56:22.264 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:56:22.264 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:56:22.265 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:56:22.266 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:56:22.284 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:56:22.284 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:56:22.285 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:56:22.285 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:56:22.285 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:56:22.296 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:56:22.310 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:56:22.312 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:56:22.312 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:56:22.312 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:56:22.312 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@710636b0 registered for zip algorithm DEF +09:56:22.312 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:56:22.312 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 789ms +09:56:22.901 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:56:22.901 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:56:22.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:56:22.901 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:56:22.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:56:22.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:56:22.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:56:22.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:56:22.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:56:22.902 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:56:22.912 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:56:22.912 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:56:22.912 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:56:22.913 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:56:22.913 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:56:22.913 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:56:22.914 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:56:22.919 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:56:22.920 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:56:22.920 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:56:22.920 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:56:22.932 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:56:22.932 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:56:22.932 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:56:22.933 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:56:22.933 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:56:22.935 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:56:22.937 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:56:22.948 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:56:22.949 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:56:22.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:56:22.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:56:22.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:56:22.956 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:56:22.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:56:22.957 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:56:22.957 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:56:22.957 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:56:22.958 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:56:22.958 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:56:22.958 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:56:22.965 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:56:22.966 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:56:22.966 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:56:22.966 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:56:22.966 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@238d68ff registered for zip algorithm DEF +09:56:22.966 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:56:22.966 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 65ms +09:56:23.349 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:56:23.350 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.8] security providers installed)... +09:56:23.350 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:56:23.363 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:56:23.363 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:56:23.363 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:56:23.363 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:56:23.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:56:23.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:56:23.364 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:56:23.365 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:56:23.365 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:56:23.365 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:56:23.366 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:56:23.366 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:56:23.382 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:56:23.404 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:56:23.421 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:56:23.421 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:56:23.422 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:56:23.422 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:56:23.447 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:56:23.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:56:23.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:56:23.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:56:23.448 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:56:23.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:56:23.529 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:56:23.580 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:56:23.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:56:23.623 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:56:23.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:56:23.624 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:56:23.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:56:23.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:56:23.625 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:56:23.626 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:56:23.626 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:56:23.626 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:56:23.626 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:56:23.639 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:56:23.641 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:56:23.641 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:56:23.642 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:56:23.642 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:56:23.642 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@51bd8b5c registered for zip algorithm DEF +09:56:23.642 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:56:23.642 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 292ms +09:56:23.712 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:56:23.712 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:56:23.712 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:56:23.712 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:56:23.712 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:56:23.712 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:56:23.712 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:56:23.713 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:56:23.713 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:56:23.713 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:56:23.714 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:56:23.714 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:56:23.714 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:56:23.714 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:56:23.714 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:56:23.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:56:23.723 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:56:23.733 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:56:23.733 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:56:23.733 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:56:23.734 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:56:23.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:56:23.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:56:23.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:56:23.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:56:23.737 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:56:23.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:56:23.754 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:56:23.768 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:56:23.783 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:56:23.784 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:56:23.784 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:56:23.784 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:56:23.785 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:56:23.786 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:56:23.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:56:23.795 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:56:23.796 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:56:23.796 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:56:23.796 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:56:23.797 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:56:23.797 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:56:23.797 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:56:23.797 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:56:23.798 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:56:23.798 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2462cb01 registered for zip algorithm DEF +09:56:23.798 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:56:23.798 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 86ms +[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 10.525 s - in org.jose4j.jca.ProviderContextTest +[INFO] Running org.jose4j.http.GetTest +[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.018 s - in org.jose4j.http.GetTest +[INFO] Running org.jose4j.lang.ByteUtilTest +09:56:26.060 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length +09:56:26.061 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length +09:56:26.061 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length +09:56:26.061 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length +09:56:26.061 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length +09:56:26.061 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length +09:56:26.079 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length +09:56:26.079 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length +[INFO] Tests run: 31, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.lang.ByteUtilTest +[INFO] Running org.jose4j.lang.JsonHelpTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.lang.JsonHelpTest +[INFO] Running org.jose4j.lang.MathsTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.lang.MathsTest +[INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest +[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.099 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest [INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest +[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.047 s - in org.jose4j.jwk.RsaJsonWebKeyTest +[INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest +09:56:27.107 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:56:27.108 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:56:27.108 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:56:27.108 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:56:27.108 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:56:27.109 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:56:27.127 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:56:27.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:56:27.164 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:56:27.165 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:56:28.120 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:56:28.131 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:56:28.133 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:56:28.133 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:56:28.191 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:56:28.207 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:56:28.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:56:28.228 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:56:28.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:56:28.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:56:28.591 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:56:28.591 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:56:28.636 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:56:28.636 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:56:28.636 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:56:28.693 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:56:28.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:56:28.805 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:56:28.865 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:56:28.866 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:56:28.866 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:56:28.866 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:56:29.079 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:56:29.082 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:56:29.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:56:29.100 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:56:29.100 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:56:29.101 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:56:29.101 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:56:29.102 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:56:29.117 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:56:29.118 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:56:29.131 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:56:29.131 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:56:29.131 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@44040454 registered for zip algorithm DEF +09:56:29.131 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:56:29.131 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 2023ms +09:56:29.150 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:56:29.163 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:56:29.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:56:29.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:56:29.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:56:29.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:56:29.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:56:29.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:56:29.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:56:29.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:56:29.165 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:56:29.165 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:56:29.165 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:56:29.165 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:56:29.165 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:56:29.166 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:56:29.182 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:56:29.184 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:56:29.184 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:56:29.184 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:56:29.184 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:56:29.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:56:29.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:56:29.186 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:56:29.186 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:56:29.186 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:56:29.203 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:56:29.205 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:56:29.223 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:56:29.224 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:56:29.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:56:29.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:56:29.225 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:56:29.226 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:56:29.226 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:56:29.226 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:56:29.242 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:56:29.243 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:56:29.243 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:56:29.243 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:56:29.244 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:56:29.244 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:56:29.244 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:56:29.244 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:56:29.244 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:56:29.244 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6b53bcc2 registered for zip algorithm DEF +09:56:29.245 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:56:29.245 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 82ms +09:56:29.246 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. +09:56:29.670 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 512 but was expecting 256 +09:56:29.694 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying RS512 signature: java.security.SignatureException: Bad signature length: got 256 but was expecting 512 +[INFO] Tests run: 23, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.028 s - in org.jose4j.jwk.VerificationJwkSelectorTest [INFO] Running org.jose4j.jwk.HttpsJwksTest [WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0 s - in org.jose4j.jwk.HttpsJwksTest -[INFO] Running org.jose4j.jwk.X5cTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwk.X5cTest -[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest -[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest -16:06:51.260 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'y' parameter.). JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. -16:06:51.260 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'). JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest -[INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest +[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.306 s - in org.jose4j.jwk.EcJwkGeneratorTest +[INFO] Running org.jose4j.jwk.JsonWebKeySetTest +09:56:30.286 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.InvalidKeyException: "NOPERS" is an unknown or unsupported value for the "crv" parameter.). JWK params: {kty=EC, crv=NOPERS, kid=iRTU, x=tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY, y=2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +09:56:30.303 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Boolean type but is required to be a String.). JWK params: {kty=false, x=GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY, y=Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +09:56:30.304 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'x' parameter was Array type but is required to be a String.). JWK params: {kty=EC, x=[IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, huh], y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +09:56:30.304 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=1, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +09:56:30.304 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Number type but is required to be a String.). JWK params: {kty=885584955514411149933357445595595145885566661, x=IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM, y=57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +09:56:30.305 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: 'kty' parameter was Object type but is required to be a String.). JWK params: {kty={EC=EC}, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +09:56:30.305 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'kty' parameter.). JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","crv":"NOPERS","kid":"iRTU","x":"tcjSy7nIVZ2DVz-RKjqHIJqr5WDqZLS6fq4rEN6pfGY","y":"2oqx5jvggJKy-LXFjpDOpL0g_SbiLylu_8xx-dBMQeQ"}, {"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. +[INFO] Tests run: 10, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.083 s - in org.jose4j.jwk.JsonWebKeySetTest +[INFO] Running org.jose4j.jwk.JsonWebKeyTest +[INFO] Tests run: 13, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.091 s - in org.jose4j.jwk.JsonWebKeyTest [INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintUriTest -[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jwk.Rfc7638JwkThumbprintUriTest -[INFO] Running org.jose4j.jwk.OctJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctJwkGeneratorTest +[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.179 s - in org.jose4j.jwk.Rfc7638JwkThumbprintUriTest [INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk, y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2, crv=P-521} -[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest +[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.032 s - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest +[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest +09:56:30.789 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Missing required 'y' parameter.). JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. +09:56:30.796 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it (org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'). JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest [INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.122 s - in org.jose4j.jwk.RsaJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.944 s - in org.jose4j.jwk.RsaJwkGeneratorTest +[INFO] Running org.jose4j.jwk.ExtraJwkParametersTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwk.ExtraJwkParametersTest +[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.038 s - in org.jose4j.jwk.DecryptionJwkSelectorTest +[INFO] Running org.jose4j.jwk.X5cTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.033 s - in org.jose4j.jwk.X5cTest +[INFO] Running org.jose4j.jwk.OctJwkGeneratorTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwk.OctJwkGeneratorTest [INFO] Running org.jose4j.jwx.CompactSerializerTest -[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwx.CompactSerializerTest +[INFO] Tests run: 11, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwx.CompactSerializerTest +[INFO] Running org.jose4j.jwx.HeadersTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwx.HeadersTest [INFO] Running org.jose4j.jwx.JsonWebStructureTest [INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwx.JsonWebStructureTest -[INFO] Running org.jose4j.jwx.HeadersTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwx.HeadersTest +[INFO] Running org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test +[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.092 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test [INFO] Running org.jose4j.jwe.JsonWebEncryptionTest -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jwe.JsonWebEncryptionTest -[INFO] Running org.jose4j.jwe.ZipTest -eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..2USc8h7WFaDN1CtxY7rZtQ.J4Pe84ZCLEo3fodz8DaHw-VkekVB5skukaNFUh0VhrVONVt5du3Q_kZIBbRQOnLwC1ScAVL9yRrEHdTeM3t0hA.DcgyEbi5NYYAcrpmC97VMw -eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..F7yfjzdeP2KVLV6HBv6Zog.lda0lU_9FOHv8QewsAWM2JGyldIZBPaglaq_TR8wanPn5J-9AGYAojRlDaARC9alaoSWjAzlTGCqYfCeMmXvEN9Dg4vTmobpzvizbTRz9zBBIC0nNvpEFTrVHfS7C1o19o49H9XbcsfI07OU5P86TvrM3eZyDfwFQ3KWejri5Mh6OlEnohq45nDqcj5v_pxa4DVbue1QqhPotDDHgwpV7sz5LTJzs84KW6I3xTEZJvrqh-9GuZUt3JoUMak0zjVlHqZAXE3UjzKGXjR1GewRXAoUCwiWGOIJTBJtFj5IetsMwl60ooaZ6FzTJubv9X7D0kH_LZOyDddHsTN5QiGddF8YRWqOzHKnNrs4DQFuUnw5hXK4mc5NUq_wIrnhd83u.w-DFMaBsobLPHE0lCkB0gA -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwe.ZipTest +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.131 s - in org.jose4j.jwe.JsonWebEncryptionTest +[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.148 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest [INFO] Running org.jose4j.jwe.CritHeaderTest -16:06:51.440 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.CritHeaderTest -[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest -[INFO] Running org.jose4j.jwe.NegativeJweWrappingTest -16:06:51.449 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -16:06:51.449 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -16:06:51.451 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -16:06:51.451 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -16:06:51.453 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. -16:06:51.455 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. -16:06:51.456 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA -16:06:51.458 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ -16:06:51.460 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). -eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.dWqgviABUW5-67EXtpJcJHN_t-esKfCNos_MwiQdX7AzvHk6zsYG25KB2m70LIkw8fUaEFayHKJhqP49cIiH9FinFIvbC3hyDSdlMV_cOqjbKpMVD0ilElj4eRnZlCt1tuor5zheFrV7BXjz029bPa8gkdCphgmM8HGyYqGG1qZV3PM2CC1QZ8Fd1ChVUjhtAyUTC6VJt4GzhwRFVsYUC4KnM3Qojz306sV5DryJ7CTNsy7AyekpjavL-BWAR0cHkhe7Q7VkWDNMUJSiNKVxvYZ4FNSDnTxYf_3WzD6-YZe3dfkqZbJoEUwyzI574BiiqqgZ9j8rWgMj-OpPX_WPGQ.w1zzLFN6dccbETRPwWc-ig.xPhy3eWyRiVUsqiGC-6J1C9s5crsw_rEgYwcj529fBC2jv6DqTTVQRypBuwUMkQrnaoui39rbGqefL_iPahp5eyextnMDaeTSHUD1lmUDjI.6Uzq8QhtmZePdnbmaKj_Zg -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.015 s - in org.jose4j.jwe.NegativeJweWrappingTest +09:56:32.664 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwe.CritHeaderTest +[INFO] Running org.jose4j.jwe.ZipTest +eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..hVle6ONzYG3mREi3Q1y0oQ.1rz4VY9GkvFMhwRP7T2q4V4yDnesQ7ku0vegLQ_6KYUUu01BaeMF4-3SshBgdaWYUo-inelqf1U9z6zPYIN4dw.Sb3IhShW_s8XaIemtsakgQ +eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..xGfOFSxwhCQ8wiHPEqdAWQ.l8r_kBZ18dYXJ3eQl9V-cg9SyqunX3RZs_s7gB6RxJrbWzFejaNgPt72rCmTuUFsOGh7rztVP6vZiW-aO9QgItmd3VavoyIF16VC2j9I0taxF6uBYr-bJ8LeNQVPeKwylYCiApE40Hp3F1siHjJFA7oIrPsNVZ-G6yvAvpTaAWdmWEKA5V40jowSj77l-IpMEhSahtxp7wxl4u2ZKRZ4Yf9xv440N3k9PFA7AHkUeh_fkoCNAYObji0U0bdGEP6fCJoQlsxIx316SR8VFjOdkT5a4ZleZy1z3qQflRkLxZ2KQAUc6jpM567TMIkONXPPmwkYx2omLtrudapguuDIBYugxEX1yGnygwZqab5fD6FNFXRyn7iQGe1BV-NWqSOp.mgx780YWaSRpyIDY7Ix7Gg +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.ZipTest +[INFO] Running org.jose4j.jwe.GeneralJweTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.GeneralJweTest +[INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.02 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +[INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest +[INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.28 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest [INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0 LfkHot2nGTVlmfxbgxQfMg -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest -[INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest [INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.201 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test [INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest -[INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.02 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest -[INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest -16:06:51.513 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE -16:06:51.521 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@31e04b13 -16:06:51.525 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@6c1832aa -16:06:51.529 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@4beeb0e -16:06:51.530 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key -16:06:51.531 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE -16:06:51.691 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe8824 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.179 s - in org.jose4j.jwe.JweCryptoPrimitiveTest -[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest -16:06:51.696 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiSkJ0N2VFcXF4Q3VOczFDQkxnMVNnSldqR3FoN1VCZEo5NnNQejdtOWoxUSIsInkiOiJ4YjQxVTBlYVZhRW5KS2tqUkw0SXI3YnJnQTFDejNScUR2YW5yUUtBYzBjIiwiY3J2IjoiUC0yNTYifX0.m5_7RTC7YoMBiEIfrB3egEX0G5zBXI5Ih8WNj56j4OUr0erj-Yh1fQ.3V9PvHBGsl19l2Od8oWpAQ.KtvZTpic66-BaPBSRiRKzIPkbhdlYVshMhzH6ZNLKyjO_VMmTHuZ7VuDCpMpiBAkp7aXFnE3aIAobFdcStQ4Rw.O8jkuUtUZAqtfOky_oH0ag -16:06:51.700 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicE8xWEd0MXY1WTNDaGxsZkZYcWVPYnNfZnZ1WUVwN0U3MXVDeGY1TURXSSIsInkiOiItWExfT2VqNG5jUTBqUDBzeHdKTC1kNDZjR0FPTWNyWjN3SnlCX05EMWxVIiwiY3J2IjoiUC0yNTYifX0.-dFY2J_qtsxNazRseecsrmfn07YFOS4_mijixePrjyV6XE9IiGUXMZqE5ru3l_0_Y08GKKVV0o8.y1zcqyZeX-WzV_zNvy4Q5g.ITLuLiGUVChP-12z6_msBiBD8jZt_7fmERLx4m97UoFXAurul9VJAk34h93l8cs0_7ph81emle2lzWfXC6NFQA.n3k109ngPcF9ZijOYtTwzTcVk8Pj8mUL -16:06:51.704 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiMmc4YWpuSTdmV3pHV1BKREFmOG1lVS1COFV0MW9NV0VrOXRMWHprY2ZBNCIsInkiOiJRMVRPMWVjUV9KSzRMTGpELWpXY1o2Skpsd1lvQWtwSVNxd3RwdlVQcENVIiwiY3J2IjoiUC0yNTYifX0.V3t05RaSc73LAvLizqdoTCVh8iGOOEzIl_hkVuHBXYWx-YwwVWW9tqu9JAebTvN6KpbbIErVpN4XJhu0DfLlqYSmwq8aCjdh.jMTEe-mfhLr0m_ghrVYyHg.7QzBYsyfWPkndQRnQLV6mcLDt8WF5TVVwPcx6lWHrOie6H6C9rNIKPrWSr0be0imBQH_L4pIXP4Zh88fTGrnXA.XBal_F69th9LY5jFnWg5yiDR_OIkrYOShdgVyb9av78 -16:06:51.708 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiSlpqUVZCT0tTLTFRb2FuNVJ0NHFSRnU2R0hzX3JHWXRsSm5NNXRmbGxCMCIsInkiOiJHUDZPdTBONWZPcXItM2J5SHZzV08xUVdjWlBiMVNVTG5SNjJGQ3ZNVElFIiwiY3J2IjoiUC0yNTYifX0.XVRkGSlY5l7CCWCbmbhwLioRzzxx_i0REHkQLinUccRhmNe_g7OuFQ.trUnCqYotV5KJ7XYCRWdeQ.6scxxDb6DKQZbAmJSjOrIRPy1cLOrafOKjYSlZbNsQ3U8YhdvthHIbah_OG8Ggd1e6mcOShMcL0jXOeYBsHlWQ.wVaBqp-0YDcNJXCUgsaFgQ -16:06:51.712 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1BSSE4xMEVWUngwOGlSRndkcjl5cUJJdDdyYTJQRW52d2Q0aGRmbVR1dyIsInkiOiIwRE5jSEhQNDJqWHljVE9aVS1WSlZUWElSODdkd3dVU2VJVDlvWTBJSVlvIiwiY3J2IjoiUC0yNTYifX0.4FUSlYDsjOHExRANGUT5hrFydVZsSwT1kVpJoSZSZv_yC9wMxoSwA_cfv-b494ppXCrAtize0ys.ZRkwHrQTDmM9lULBGDM6Tg.KwggsdDn2Ae3_sPxw6cNJj_y79ld2ERXQJW9DGYVgRuRvOXqxsxkTDruKC7wllXjXX2OmERKEKctjkaySmoryA.sktW-STySfTeDRrF5cER2tWKIpzI4vQc -16:06:51.716 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiVmV4OE1rUFBUUXhZYVBFb2pHSFJMamtyRG5OS3ZxODJTcDJwZ0JRbUQzWSIsInkiOiJTNlhZY0lya0ttNnU0TXBMMi1DX3pDSkphM0dyX2Q5N0lQUk5mR3ZzX0trIiwiY3J2IjoiUC0yNTYifX0.eR6G7LRgI5xeRh3fSiyKCaVMEvXuILIIQqfEvzEyO-4476coCOqCx_Jma71oHBz3K6hnvVCG-griuXA3naVdeL09FnLFMCnJ.Mksg2nDER7jW4S4WsOljMQ.IgemklHJa3xvtoLnZUCykPD3o6WT-huD4cZXy_4yB3y2cq5A_kr2DLJgT8PTkFamzMQfgGCescMJWC6iCNy0jw.Gib2pfGj_vsWyuMU9vDdSzA7aNyD9hDhCCaOfNv8Egg -16:06:51.720 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4Ijoid3c0bE9OTVN3Umo4VTJySnVYUi1VaWpJMzBhR3V5b3FPcjhocmRGRmM2NCIsInkiOiJROHZocEp2S0JDYV94VW5aNk92WU9nWVBXdm1VQzFBNVBNYTdFR2tkNzdrIiwiY3J2IjoiUC0yNTYifX0.aoVBmcOx8qRtgsel7sa-XZSWcqQ1JJeBTdIJ_APepFQo0K5qSZB8Dg.51Hh4my49kvaWn1VVhE5Ng.JN3AxJADGylYl1DjbREN_DBI64sonvBKmG4Au4QrPjwIciy8ndaweHe31tOLdwQAGm2eh4bsiEblJeDZh2aCdw.JoEeUBZKfZcjaES6Nl3y0Q -16:06:51.724 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiVmJGeXZleWlwcFYyOWIzTmxYajRHQVdzcmZhdldWWGJkTnA5NUVUV0U1cyIsInkiOiJJZ1RRaWtTTE80SlA0dWlodGpKcE5IUGc5alFlMmpQeWVfZ2VFV2lNSnVrIiwiY3J2IjoiUC0yNTYifX0.xE6mlNP6v1y-r5lioUzz_erxKBCZJApUnVxNOSt2DWMgLd6B2B8hZBD0zYA_szu1avU4W2M0mQo.T-r5E2EC3v97LE9CqB5Grg.ezyjiI-KCahOPIoEkCsGm4_XBTHmT3vCf-QwRY1DrWob4O5lfjp8DGwikBZTqwt22LeFMH9iotWgfPQUUauO7w.aMxTR3v6c-SAfTnNI6uWCzQITHTv7izR -16:06:51.728 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiWC0xdUZDMHpucENmY0I5bUtvcmkzYlF4d0JLZksyUENJOHFESENDLVdWayIsInkiOiJrSGJzMUIzZkFYX200SG0xX281bDBPUFB1dkZfUG9YYkxzVlJSX2xyYk5zIiwiY3J2IjoiUC0yNTYifX0.zMiLntrGIpozztXrpryih6vPDK3fbpeJuzLlF1gGOZiBnh4FBHMGYAITgeLRcOD5kuh-a6BWEt0tp0rvyRVv33w95oa4av-8.Su9vT2UpzeS_PXvnsY7yuw.ybtkJb9VqbSoYR1OStJeSlavN9VjDB24CwmRBdYpA6C1k_YqjA0E8nDmSunkHh9kx56f2UF6WYrisZFNrKlFuw.hJLKoBqzRuJ_dnItsupOqhqkE69gAFAusBi8FHASKWM -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.037 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest -[INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest -[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.055 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest +[INFO] Running org.jose4j.jwe.NegativeJweWrappingTest +09:56:33.685 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +09:56:33.686 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +09:56:33.692 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +09:56:33.693 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +09:56:33.697 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. +09:56:33.704 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed. +09:56:33.709 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA +09:56:33.714 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ +09:56:33.719 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.Wlki4BLDbYFFhECv8EamoM-kfZe3AkMImtKVmfH18fMOEJn0kksXNZ1wnF23aTsfnlT1nx2UlHwZnkFHumhV6FlC_PhNpTnKRym5fY9W-WVCQrnwNrlF9yxBRdLYYmkQgyUbfpFT2g3AoFINkSAIx3nHP7bVCc_5rwXWk6YfXXINEEOmXm0I_bFUygmi9SJNBcH7KGeKXyYpUZs0ZYwT3CeIU33HpH-j_XSqCR13yaCGns_w3vTntId_f-yIJt4H4Wk6rvnS59dcuW8EsAptX_sBrm7mRare_2z3wOwsrCz9yqStq5dylkniQ8j6jqhhdEMD2zGDtwHqh8wz4KfIUA.oabtgqKy4h_4oNaSK-LCeg.RM1NIh9lWtUkEwnnkGj3KHLiamyXznUoOJJ0YkAI5DTa3Uwo4dX1c6dYh00s23nB4b5iWuHG7_Hg3jqRXWwa7a8Byay5MjbsZhILV2PSDtU.q26PVSa_n2OwkhwPNdWhKg +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwe.NegativeJweWrappingTest [INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest +[INFO] Running org.jose4j.jwe.XEcdhTest +{"kty":"OKP","crv":"X25519","x":"SVh8szkFKh50nQNwxn_Z1SXDqX_9e_ftY50Z2tPODC0","d":"b82Vsd2Q6vxwpEw_lD7jcB2omTJAi5PIhyu8pkRD5dY"} +eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiZE4xdGtCLUVHM3RLTzFiZFVPZFJ2S2pNUUlRS0RCVGJ2NUZIYVZ0MFBuayJ9fQ..bD8PWHbHnSqKVthBtLf1eA.YT6Sf5hXaptaAPM27E_z-bWxaxkApW7CA0hBeRXD4RK2OgtJxPGWZEKBrG2h6t_-.U6KXfB3wcF3TG9vWGfg9XA +eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiT0tQIiwiY3J2IjoiWDQ0OCIsIngiOiJJS0thTDQ0UnM3bDBUb0oxNThYa0lqSzBZYjNrVTBTcVdVZ3JmcTlRWTZJYjNnZ29ULWN3Y2hvTkp6VmtIejI5UTctamFuUTJacUFBIn19.gJDlPP75jzrZ8TJxzqFQHb63KluBleVYB94ALrLTfMzT3Vw8PU7ahQERtRRbPL3nSlYGsSGm4An6EM3s0tte_qdJHlMwFiGR.R8v3Vh2QysYf701-uS29WA.OCVGYyWvA-YGdDbPthHKffpB1tAuDZqkEFErhPaHN16_-MxLu4_EUVVCjRK26pM0.xL2tjdndT4_fT6GEI3XCF2MFxvAvYEnG1tgHqg_Kv5Y +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwe.XEcdhTest +[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest [INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest -eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiVW55ZmFfOEVTVmxqTlNEMCJ9.b2pGAyb68lAlvqosM4duC5vRIQS6xJXIgymN82c71VnoZjHyY9-paA.kH6fTM0VXWJ3c7TOhO6a7Q.K4dhItLQ-WgeNpiTDIknSQ.mFRRrFw6KW78xQryJWOJ0w -16:06:53.534 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] -16:06:53.534 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2147483647) cannot be more than 2499999 to avoid excessive resource utilization.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] -16:06:53.534 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] -16:06:53.534 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] -16:06:53.534 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS384+A192KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 +eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiQTZuelh0UDJ5SmZaV3JhaiJ9.7VliF0ofWkB6YGkafQNU8Ek_hyAr3ye78U91_yDFakkIhf2CnZFnhg.BRt2drFjn9y4caZ2xgEE8w.A5yIqq1iN_VyzLbRrPJHJQ.eIob8UghDUrb5vFLd5wC2Q +09:56:56.645 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] +09:56:56.645 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2147483647) cannot be more than 2499999 to avoid excessive resource utilization.): eyJhbGciOiJQQkVTMi1IUzUxMitBMjU2S1ciLCJwMnMiOiI4UTFTemluYXNSM3hjaFl6NlpaY0hBIiwicDJjIjoyMTQ3NDgzNjQ3LCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.YKbKLsEoyw_JoNvhtuHo9aaeRNSEhhAW2OVHcuF_HLqS0n6hA_fgCA.VBiCzVHNoLiR3F4V82uoTQ.23i-Tb1AV4n0WKVSSgcQrdg6GRqsUKxjruHXYsTHAJLZ2nsnGIX86vMXqIi6IRsfywCRFzLxEcZBRnTvG3nhzPk0GDD7FMyXhUHpDjEYCNA_XOmzg8yZR9oyjo6lTF6si4q9FZ2EhzgFQCLO_6h5EVg3vR75_hkBsnuoqoM3dwejXBtIodN84PeqMb6asmas_dpSsz7H10fC5ni9xIz424givB1YLldF6exVmL93R3fOoOJbmk2GBQZL_SEGllv2cQsBgeprARsaQ7Bq99tT80coH8ItBjgV08AtzXFFsx9qKvC982KLKdPQMTlVJKkqtV4Ru5LEVpBZXBnZrtViSOgyg6AiuwaS-rCrcD_ePOGSuxvgtrokAKYPqmXUeRdjFJwafkYEkiuDCV9vWGAi1DH2xTafhJwcmywIyzi4BqRpmdn_N-zl5tuJYyuvKhjKv6ihbsV_k1hJGPGAxJ6wUpmwC4PTQ2izEm0TuSE8oMKdTw8V3kobXZ77ulMwDs4p.ALTKwxvAefeL-32NY7eTAQ] +09:56:56.645 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS512+A256KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] +09:56:56.646 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTNTEyK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJwMnMiOiJGbVE0aDY1aUFlZEs0SUFyIn0._P2Mbn0nvqRZVCaEaLnKQkMFwGNmEVbm8Ffnb5uIas0iAt5wcWC3T7rdTwyliWW11YnhpaiXH0WRalAsIUyaVHC4Ku1j9bVP.Tg2KOblqWEF9iC71O-WgBw.OCjt9WYrTFMIst7XBZ8HeA.YRqs3_nMchYr39AJYquQs8-PrZa2NGuqshOvtLfWSvE] +09:56:56.646 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'PBES2-HS384+A192KW' is a blocked algorithm.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 ] -16:06:53.534 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 +09:56:56.658 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: PBES2 iteration count (p2c=2500000) cannot be more than 2499999 to avoid excessive resource utilization.): eyJwMmMiOjI1MDAwMDAsImFsZyI6IlBCRVMyLUhTMzg0K0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJwMnMiOiJneXBKYzJFVXNtbmNqTUtqIn0.RYXJhCW2m4Pa5XPUPVVQVJRg8z-jj-zyXoa-Q1JzdfjO2tvrELM7Ko3qhkv2WcUAw3ZagzIeNjY.FhNCr7zjUt0fA6KotCbdUw.DMYLybjcrOX9cfwdWaORLg.QCGY9clkv4sz1rZeexg2dUx4ViH-BeL7 ] -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.791 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest -[INFO] Running org.jose4j.jwe.XEcdhTest -{"kty":"OKP","crv":"X25519","x":"ARElwyVMLImDPYOJQolx8eNffGrXLhv0XwoCasGAHXU","d":"iJqfRIUT8TiIzGTBztVe_M0Bu93SBhbUCd68ZH2Nn_g"} -eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiVDdoR3BEd01JVmZpbXpTWjJjWTB1aHlLTm11Wm9MN0k4MjQzd2NBRnVFYyJ9fQ..z7NsiFUn_2RATTWDc21Rig.5BovpCeMSgHifUOPHwm-mf_fdoycwv9kddVwoDapfGgmbA6Bb6XcNLCO5sls7Xg9.n9hwmva5om_SP_m2LDdudQ -eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiT0tQIiwiY3J2IjoiWDQ0OCIsIngiOiJjN1hmTXloLU1sQWVPQ1ZWdVp6UG51a0pOZ21rNG5Od1p2emNuaHhmT2daZUtyT0hmQ3NmNjFKVGh1Qm1zY18xYnBGOWVDRUdDNTBBIn19.UbzvtWgrhInRDbNZugNr4xhdsJS82taEjSpDhFnwV49G-g1kD-_cuqBNBPU8nQw7WdzuawJ97eeifrUELf_VJoss68T_qLb2.QzMFp0ArATMceKTfsJqz2Q.BPOwbNAiy2FvG1DxQd4tsnve_Xrasp4CwIOHGBByDKpF7tH4hvLqjI8Juia0iv_A.dTsEe48vEh5Ehp4B__hwvZHXshS8qSadZMdsqMn_I7I -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.025 s - in org.jose4j.jwe.XEcdhTest -[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 22.425 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest +[INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.273 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest +[INFO] Running org.jose4j.jwe.RsaKeyManagementMoreTest +09:56:57.015 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... +09:56:57.016 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch +09:56:57.037 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch +09:56:59.483 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:56:59.484 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:56:59.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:56:59.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:56:59.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:56:59.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:56:59.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:56:59.485 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:56:59.485 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:56:59.485 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:56:59.517 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:56:59.517 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:56:59.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:56:59.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:56:59.533 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:56:59.545 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:56:59.556 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:56:59.557 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:56:59.557 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:56:59.557 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:56:59.569 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:56:59.570 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:56:59.570 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:56:59.572 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:56:59.572 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:56:59.614 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:56:59.650 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:56:59.711 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:56:59.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:56:59.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:56:59.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:56:59.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:56:59.774 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:56:59.788 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:56:59.790 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:56:59.790 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:56:59.790 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:56:59.790 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:56:59.790 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:56:59.804 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:56:59.806 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:56:59.820 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:56:59.820 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:56:59.820 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:56:59.820 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@57ac5227 registered for zip algorithm DEF +09:56:59.820 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:56:59.820 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 336ms +09:57:00.031 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:00.032 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:00.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:00.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:00.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:00.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:00.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:00.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:00.032 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:00.047 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:00.050 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:00.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:00.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:00.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:00.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:00.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:00.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:00.052 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:00.052 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:00.052 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:00.052 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:00.053 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:00.053 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:00.053 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:00.053 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:00.054 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:00.075 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:00.103 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:00.111 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:00.113 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:00.113 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:00.113 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:00.113 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:00.114 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:00.114 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:00.114 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:00.126 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:00.127 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:00.127 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:00.127 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:00.128 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:00.128 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:00.128 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:00.128 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:00.128 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:00.128 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4409e975 registered for zip algorithm DEF +09:57:00.128 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:00.128 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 96ms +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 3.134 s - in org.jose4j.jwe.RsaKeyManagementMoreTest +[INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest +09:57:00.168 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE +09:57:00.278 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@2a7686a7 +09:57:00.312 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@7ec3394b +09:57:00.355 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@bff34c6 +09:57:00.368 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key +09:57:00.369 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE +09:57:01.793 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@17cd7 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.63 s - in org.jose4j.jwe.JweCryptoPrimitiveTest +[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.05 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest [INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.01 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.156 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest [INFO] Running org.jose4j.jwe.InvalidCurveTest -16:06:53.577 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 -16:06:53.578 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -16:06:53.578 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 -16:06:53.578 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 -16:06:53.578 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w -16:06:53.578 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.InvalidCurveTest -[INFO] Running org.jose4j.jwe.GeneralJweTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.GeneralJweTest -[INFO] Running org.jose4j.jwe.RsaKeyManagementMoreTest -16:06:53.585 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap/decrypt failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:481); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted...; caused by: javax.crypto.BadPaddingException: Padding error in decryption at java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:383); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:475); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2633); org.jose4j.jwe.WrappingKeyManagementAlgorithm.unwrap(WrappingKeyManagementAlgorithm.java:157); org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5.manageForDecrypt(RsaKeyManagementAlgorithm.java:155); ...omitted... -16:06:53.585 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch -16:06:53.587 DEBUG o.j.jwe.RsaKeyManagementMoreTest - org.jose4j.lang.JoseException: javax.crypto.AEADBadTagException: Tag mismatch; caused by: javax.crypto.AEADBadTagException: Tag mismatch -16:06:53.666 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:53.666 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:53.666 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:53.666 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:53.666 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:53.666 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:53.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:53.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:53.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:53.667 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:53.671 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:53.671 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:53.671 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:53.671 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:53.673 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:53.674 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:53.676 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:53.676 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:53.676 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:53.676 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:53.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:53.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:53.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:53.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:53.678 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:53.682 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:53.686 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:53.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:53.695 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:53.695 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:53.695 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:53.695 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:53.696 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:53.696 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:53.696 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:53.696 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:53.697 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:53.697 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:53.697 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:53.697 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:53.697 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:53.698 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:53.698 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:53.698 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:53.698 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6be7bf6d registered for zip algorithm DEF -16:06:53.698 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:53.698 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 32ms -16:06:53.715 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:53.715 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:53.715 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:53.715 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:53.716 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:53.716 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:53.716 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:53.716 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:53.716 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:53.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:53.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:53.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:53.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:53.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:53.717 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:53.718 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:53.719 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:53.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:53.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:53.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:53.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:53.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:53.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:53.720 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:53.720 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:53.721 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:53.721 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:53.721 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:53.721 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:53.721 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:53.721 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:53.721 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:53.721 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:53.721 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3be4fcc0 registered for zip algorithm DEF -16:06:53.721 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:53.721 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.138 s - in org.jose4j.jwe.RsaKeyManagementMoreTest -[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.017 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest +09:57:02.063 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 +09:57:02.063 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +09:57:02.064 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 +09:57:02.064 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 +09:57:02.064 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w +09:57:02.065 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.InvalidKeyException: epk is invalid for P-256 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.InvalidCurveTest +[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest +09:57:02.180 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiOHdDaF9hbEhsVG40X1V5anU0cHNKNlpXN1FnMk8xR0U2azJMYnhKNTdrbyIsInkiOiJ3cXdUNklrX0NhMDYzbXd0LWQ1VllQc2hhN004TUE1a1lVbXE5cnNodVNVIiwiY3J2IjoiUC0yNTYifX0.IRlUMwlfvPW5nWr_paG-0wF08tNDr5wKPmPgjwOygA4TQCuFBjjdcw.yJhaoKo1Arl0cfRA1ksGog.tvJHlwppE3M7rEbOzq9_Mo5S4mu8jxXcv0hsWjF6QtS8LKdOu658jhUhIHaHcf2j734jfDqUxryuL2o_t19Lvg.JrHwurtSn0564A5_3Jm2kw +09:57:02.249 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiRV83dDkyT1VJM01uOXhjNEluRVI0OFVTX0RlUEs3TERGZWw3cVo3elM0OCIsInkiOiJJaU1vdTdnUER6ZVZuTFhEbXc1elY0eV8xRHViaXk1dVBFNHpnVDdTYlNVIiwiY3J2IjoiUC0yNTYifX0.3ZtoQJtWm8fJrLF6JxYGPxSZGpbyOv6jodywm9KxQOJ5aarPo0eGTZbY77c1dtUE2Zw05YSALnU.NQiJZlfAfuyYHvZDjECbOQ.gOT59J9m1SH2jMgstqfT00ZmpoFNlarrzTYRYU422xGRMsNMERvMebM0Wuh13HA4OFGCJxfAMbqExyVqwcgdZA.4tNyFUX2tnZi8LmmIMRNeLFOxhDdj97x +09:57:02.302 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiNVpFZkVsZERKb3dzdmtONnlJdVFLNFkzWjdBajZSTUdyazBLRVRiVW1FTSIsInkiOiJFQ2N0bkE1SFcxc3hWOEdqY0l0V3haTXhUQ0V5WTFfSExUZVhZZFJKYVl3IiwiY3J2IjoiUC0yNTYifX0.EK-8q0rYEb8F7SdsZSilT1fspjp3tZU7mOKk5m4cvbtlOXdSBEC7xYUWMg8vwEPl7oLfe9w9uUIzXiibLGk9_LIou0ZCfCCP.2L7NtwY2D0LE2bTDMTKdUA.UMEorPE950m3FbPzOYd1WN7OhkGG9WfJqhiUaNj-h28cZQpbWCC13c7NPUkGgIIZaPQRIf7wElYLQGwFiY_MNw.uFrSTd91F5TU3DVHVL7QeMBlRudgKqa6gYIcJmfClBs +09:57:02.380 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiTUU3NFRXbDIwd3dIaExBZ1VKQ2FnT0t6eUpjM0lqQUpnbUtCckpqaEp6MCIsInkiOiJrTjNuZk9iR0syUWhZeVFQMWZYU1lGR1llMWtEenFicXB6ejNiTlBsQ19zIiwiY3J2IjoiUC0yNTYifX0.hFXnIA2DEsfi0Nw6fhNmFo8QOv9WgFWh1qqnaLQSqZ9ox6vS2q_TkA.j2hGm42zG58H1SixCbGeXA.1i18IZ2pC0DGsM6HOnjTkZtOOhVAaK724JTxMloqisSuMpMYX_BX9Qc0VSlYvox2rmGObU_O0tsWoM8mXuNh4w.5JIc2Z2uvInuyiLsfX2Bog +09:57:02.425 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiR3RJNXc2ZzdkREMzYWdxV2dvZWcwWWpfNW9xUHB1U3Bqc1dXY2doV2lKWSIsInkiOiJmeXZrS2VodkFZclpVbTdrMzhNMHRVT0dNQUFEWHFRMmpjd1Vmb1ZMbkxzIiwiY3J2IjoiUC0yNTYifX0.ZFgaSMTV1ArRbJ3PMI_hDGQXIa7BpZHWCrtnYxkak0Yfd6wN52sH31lRmopTkRZQaQgJ650Od7A.rwiBuWApyCA5jS-YWtuLKA.m56oaePHElWHUi2kQDX3E4h-Z0UXN1_NYNjNg9hxfqYTMw7MxMFWL-Tp3swFGaAX3OmH51VlZ_zDxRlq9RzHfw.os2zGI6yyuwjg2rljTBaPa-7VgVr5zFI +09:57:02.484 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicGxhMVJPclRrbTJVd3Z2WDBjYVFCa2NkYVVxSXFBcGVOakdzTU5xcHFlUSIsInkiOiJESDRlZkFMYXppSjk3dkZndGZhZGw1TUZnSkw3c1VRN0tZNkF3bXk1c1AwIiwiY3J2IjoiUC0yNTYifX0.6ZRFbFz_Bt2mV5hMAmo10kgkAgzihsO9fgJ091BaVTHFTrC0tbi94yJ7jEb7C11-7LOiM7CdAw9BAyOMvv0gSPPDlPA4aqqY.w3twYBU5VzH9iy7TgeF_qA.vu41VJUDTJGlMlETndjf3zmpjs3OQak0BZQo9jIG5wYDbBFGuE75jq6bE0jLMN1JYldrCSxlz-RpHfTX6UlG1g.rCIt6YaEEQ9329QpVEDRtCuNc1iBwd1hiZ3M3w05S8U +09:57:02.526 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoidVN1RmpmQ0VBWVJjRWJ6MExuMTVVdmlBZHJrUlM2QmFLYnQyaHRQaTQ5SSIsInkiOiJlamRpU09aMURoSFMyb1M5S1RVN1hoOVpXalZndmN0anYyR2RhbDVSaUI4IiwiY3J2IjoiUC0yNTYifX0.QqQzlPclm1okk3lSqnuhSA-REK9pszgdm7B_EXqh3F4vec0NarAj5A.HtmgGwiyVWVMD93W32_e8g.WquaSbFpkx5y4M_hjfBoUdHBBDEP5I-2FFKLnwk6RnFN0voK65XVw7xr5cx8YyHzhkFBv-DbpemPeyatluZbrg.TK_z_8ouT1U7JmZkfn1KeA +09:57:02.585 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZzVrajZUMzdxUWNWRmJ1azlwR1NoQWxyZmxVM3BFS2JDOG9fdm5FU0VESSIsInkiOiJQSks1dXlMUC1NY2RDc1ptRmdZcGFFbmwtU05SWFllT0gyY1lPLVhpN1VrIiwiY3J2IjoiUC0yNTYifX0.yPpUSAwJniA0N_nLzSS_cezYfly9WaVI1HJ1hStVlJ6THDoklGnkZjAaZ9EKvBdS89kF4MlYB5Q.87VtQ3Usozy91uAcUoRZZA.j74Nu4pqcaYuIhLGlHLI-9sV11ZyB68e4pNcy1VdQkxI5afa4dVAIDPvBAmdrCD48mspIqqzJwaOp7AXU5wjwQ.v6AZsqWlWKVNdH_aaRrLRbFtf_9zaIGE +09:57:02.626 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZUJudUxpSkZhTnM2dkc4TjZFMmd1NmZnQU0tZXd2b085c3YzTHFPWFJtTSIsInkiOiJ6MzNXYnU1VWpPZEptRjQybXJ6VUcyZHFpczRHd2owSmkyUlRoN2hfRExRIiwiY3J2IjoiUC0yNTYifX0.Q8UFGm1wly55uD6eVhTsXbp6ScQjVBa3FyvKOUZZKzTnyUxvTwqiXCjPhAhIZMmbTjs1VhAEsR0b0vl8LVDAV0aNkXISQhlV.Qj294oQ8ZHGWHPzqSRPeBA.1xMUazaWz3wPVMCqUtGRu0SMReP9nSDO7-PcJq694YosruVSjihyCVhHvMEwCLSqibuPh_N3XAmpKYQ2IQLpfA.0rleAViEvm3qKUDpSgJollWiVi0U6JJC3s-D_b-juSU +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.527 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest [INFO] Running org.jose4j.jwe.NegativeJweKeyTest -16:06:53.743 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). -16:06:53.743 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -16:06:53.743 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -16:06:53.743 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -16:06:53.743 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -16:06:53.743 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -16:06:53.744 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -16:06:53.744 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -16:06:53.744 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -16:06:53.744 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -16:06:53.744 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -16:06:53.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -16:06:53.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -16:06:53.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -16:06:53.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -16:06:53.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -16:06:53.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -16:06:53.745 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. -16:06:53.746 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -16:06:53.747 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +09:57:02.696 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). +09:57:02.698 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +09:57:02.698 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +09:57:02.711 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +09:57:02.713 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +09:57:02.713 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +09:57:02.714 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +09:57:02.714 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +09:57:02.728 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +09:57:02.728 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +09:57:02.729 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +09:57:02.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +09:57:02.750 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +09:57:02.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +09:57:02.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +09:57:02.751 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +09:57:02.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +09:57:02.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +09:57:02.752 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +09:57:02.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. +09:57:02.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. +09:57:02.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. +09:57:02.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. +09:57:02.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. +09:57:02.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. +09:57:02.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. +09:57:02.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. +09:57:02.753 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. +09:57:02.754 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. +09:57:02.754 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. +09:57:02.754 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 784 bit key was provided. +09:57:02.754 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 1264 bit key was provided. +09:57:02.770 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. +09:57:02.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. +09:57:02.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. +09:57:02.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. +09:57:02.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. +09:57:02.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. +09:57:02.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. +09:57:02.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. +09:57:02.771 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. +09:57:02.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. +09:57:02.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. +09:57:02.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 784 bit key was provided. +09:57:02.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 1264 bit key was provided. +09:57:02.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. +09:57:02.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. +09:57:02.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. +09:57:02.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. +09:57:02.772 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 784 bit key was provided. +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 1264 bit key was provided. +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey +09:57:02.773 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey +09:57:02.774 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +09:57:02.774 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +09:57:02.774 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +09:57:02.774 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. +09:57:02.783 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. +09:57:02.785 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +09:57:02.785 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +09:57:02.785 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +09:57:02.785 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +09:57:02.785 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +09:57:02.785 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +09:57:02.786 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -16:06:53.748 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +09:57:02.786 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +09:57:02.786 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +09:57:02.786 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +09:57:02.786 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +09:57:02.786 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +09:57:02.786 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits +09:57:02.799 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +09:57:02.799 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +09:57:02.799 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +09:57:02.799 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +09:57:02.799 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +09:57:02.799 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits +09:57:02.799 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +09:57:02.799 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given 256 bit AES key +09:57:02.800 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given sun.security.ec.ECPrivateKeyImpl@f7754045 +09:57:02.800 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Encrypting with ECDH expects ECPublicKey or XECPublicKey but was given null +09:57:02.800 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +09:57:02.800 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -16:06:53.749 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -16:06:53.757 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +09:57:02.800 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +09:57:02.800 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +09:57:02.897 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 - parameters: java.security.spec.ECParameterSpec@e1e2e5e -16:06:53.757 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -16:06:53.758 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -16:06:53.758 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits + parameters: java.security.spec.ECParameterSpec@312ab28e +09:57:02.897 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +09:57:02.898 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +09:57:02.898 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -16:06:53.758 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -16:06:53.758 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -16:06:53.758 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +09:57:02.907 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +09:57:02.907 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +09:57:02.908 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 - parameters: java.security.spec.ECParameterSpec@e1e2e5e -16:06:53.758 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -16:06:53.758 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -16:06:53.758 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits + parameters: java.security.spec.ECParameterSpec@312ab28e +09:57:02.908 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +09:57:02.908 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +09:57:02.910 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun RSA public key, 2048 bits params: null modulus: 20407373051396142380600281265251892119308905183562582378265551916401741797298132714477564366125574073854325621181754666299468042787718090965019045494120492365709229334674806858420600185271825023335981142192553851711447185679749878133484409202142610505370119489349112667599681596271324052456163162582257897587607185901342235063647947816589525124013368466111231306949063172170503467209564034546753006291531308789606255762727496010190006847721118463557533668762287451483156476421856126198680670740028037673487624895510756370816101325723975021588898704953504010419555312457504338174094966173304768490140232017447246019099 public exponent: 65537 -16:06:53.758 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 -16:06:53.759 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key -16:06:53.759 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits +09:57:02.910 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given sun.security.rsa.RSAPrivateCrtKeyImpl@7fd321a6 +09:57:02.910 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given 128 bit AES key +09:57:02.923 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Decrypting with ECDH expects ECPrivateKey or XECPrivateKey but was given Sun EC public key, 256 bits public x coord: 57807358241436249728379122087876380298924820027722995515715270765240753673285 public y coord: 90436541859143682268950424386863654389577770182238183823381687388274600502701 - parameters: java.security.spec.ECParameterSpec@e1e2e5e -16:06:53.759 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 -16:06:53.759 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. -16:06:53.759 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey -16:06:53.759 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:53.759 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey -16:06:53.759 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. -16:06:53.760 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. -[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.jose4j.jwe.NegativeJweKeyTest -[INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.029 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest -[INFO] Running org.jose4j.http.GetTest -[WARNING] Tests run: 1, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0 s - in org.jose4j.http.GetTest -[INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest -16:06:53.829 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.314 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithmTest - Expected exception because this tests going over the max allowed size of decompressed data org.jose4j.lang.JoseException: Maximum allowed size of decompressed data exceeded (which is 204800 bytes but configurable with the org.jose4j.zip.decompress-max-bytes system property) -16:06:54.314 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.315 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.315 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.52 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest -[INFO] Running org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test -[INFO] Tests run: 47, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.base64url.internal.apache.commons.codec.binary.Base64Test -[INFO] Running org.jose4j.jws.JwsUsingRsaSha256ExampleTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest + parameters: java.security.spec.ECParameterSpec@312ab28e +09:57:02.924 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: epk is invalid for P-521 +09:57:02.924 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Use of the secp256k1 curve is not defined for ECDH-ES key agreement with JOSE. +09:57:02.924 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey +09:57:02.925 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:02.925 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.ec.ECPrivateKeyImpl to java.security.PublicKey +09:57:02.925 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. +09:57:02.925 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. +09:57:02.925 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. +09:57:02.925 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. +09:57:02.926 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. +09:57:02.926 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +09:57:02.926 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. +09:57:02.926 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +09:57:02.926 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. +09:57:02.926 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. +09:57:02.926 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. +09:57:02.926 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. +09:57:02.934 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. +09:57:02.935 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. +09:57:02.935 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +09:57:02.935 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. +09:57:02.935 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +09:57:02.935 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. +09:57:02.936 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. +[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.277 s - in org.jose4j.jwe.NegativeJweKeyTest +[INFO] Running org.jose4j.keys.EllipticCurvesTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.031 s - in org.jose4j.keys.EllipticCurvesTest +[INFO] Running org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +09:57:03.048 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: No jwk in JWS header): JsonWebSignature{"typ":"dpop+jwt","alg":"ES256"}->eyJ0eXAiOiJkcG9wK2p3dCIsImFsZyI6IkVTMjU2In0.eyJqdGkiOiItQndDM3lFU2MwNGFjYzc3bFRjMjZ4IiwiaHRtIjoiUE9TVCIsImh0dSI6Imh0dHBzOi8vc2VydmVyLmV4YW1wbGUuY29tL3Rva2VuIiwiaWF0IjoxNTYyMjYyNjE2fQ.DlWrKDQE15d6lN14J525P877gT_pmYYKFwpFmUvs3uQ96wTHV-4ZdnozfXVmlHmpgF5DA_3Ld8x5iyS7MrOjhw] +09:57:03.068 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Problem processing jwk from JWS header (jwk header contains a private key, which it most definitely should not.)): JsonWebSignature{"alg":"ES256","typ":"dpop+jwt","jwk":{"kty":"EC","x":"76nY8PkSVA80iOPq3UEGnocuOGhQjGOkcPpbyWpsWmg","y":"00LZB2IcOxErkNZwcQX_dmudk-atORMKjDBTsUeMvoU","crv":"P-256","d":"IIbXpUbIHemOAreeQ_LM2akq7y66DcYluvgydOritJU"}}->eyJhbGciOiJFUzI1NiIsInR5cCI6ImRwb3Arand0IiwiandrIjp7Imt0eSI6IkVDIiwieCI6Ijc2blk4UGtTVkE4MGlPUHEzVUVHbm9jdU9HaFFqR09rY1BwYnlXcHNXbWciLCJ5IjoiMDBMWkIySWNPeEVya05ad2NRWF9kbXVkay1hdE9STUtqREJUc1VlTXZvVSIsImNydiI6IlAtMjU2IiwiZCI6IklJYlhwVWJJSGVtT0FyZWVRX0xNMmFrcTd5NjZEY1lsdXZneWRPcml0SlUifX0.eyJqdGkiOiJiYzc4OSIsImh0bSI6IkdFVCIsImh0dSI6Imh0dHBzOi8vYXBpLmV4YW1wbGUuY29tIiwiaWF0IjoxNjQ3OTU5MTMyfQ.-GKT4h58oZzS4LGk8b44Dh4GoJ9Y2extHUOr_LzbFIibO_XXfanPZ8ePZkXd8s7cuQyFKagePUVCdu1T2UKbTQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.06 s - in org.jose4j.keys.resolvers.EmbeddedJwkVerificationKeyResolverTest +[INFO] Running org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest +09:57:07.539 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +09:57:07.545 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} due to an unexpected exception (java.io.IOException: https://www.example.org/says 'no GET for you!') while obtaining or using keys from JWKS endpoint at https://www.example.org/ +09:57:07.577 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +09:57:07.578 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +09:57:07.578 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Fri Mar 07 10:57:07 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +09:57:07.759 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +09:57:07.760 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +09:57:07.761 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +09:57:07.761 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Fri Mar 07 10:57:07 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +09:57:07.852 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +09:57:07.852 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +09:57:07.854 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +09:57:07.854 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Fri Mar 07 10:57:07 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +09:57:07.897 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +09:57:07.897 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES384"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +09:57:07.897 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +09:57:07.911 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +09:57:07.911 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Fri Mar 07 10:57:07 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] +09:57:07.913 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}] obtained from https://www.example.org/ +09:57:07.927 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +09:57:07.928 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +09:57:07.928 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Fri Mar 07 10:57:07 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +09:57:07.928 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"k2"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k1, x=1u9oeAkLQJcAnrv_m4fupf-lF43yFqmNjMsrukKDhEE, y=RG0cyWzinUl8NpfVVw2DqfH6zRqU_yF6aL1swssNv4E, crv=P-256}] +09:57:07.928 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +09:57:07.928 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +09:57:07.928 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Fri Mar 07 10:57:07 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +09:57:07.929 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolver - Refreshing JWKs from https://www.example.org/ as no suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} was found in [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +09:57:07.929 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://www.example.org/ +09:57:07.929 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://www.example.org/ +09:57:07.929 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://www.example.org/ will be cached for 3600 seconds until about Fri Mar 07 10:57:07 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] +09:57:07.929 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - this was expected and is okay: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"nope"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=k2, x=865vGRGnwRFf1YWFI-ODhHkQwYs7dc9VlI8zleEUqyA, y=W-7d1hvHrhNqNGVVNZjTUopIdaegL3jEjWOPX284AOk, crv=P-256}] obtained from https://www.example.org/ +09:57:07.943 DEBUG org.jose4j.jwk.HttpsJwks - Refreshing/loading JWKS from https://abc.bfe.xyz/ +09:57:07.944 DEBUG org.jose4j.jwk.HttpsJwks - Will use default cache duration of 3600 seconds for content from https://abc.bfe.xyz/ +09:57:07.944 DEBUG org.jose4j.jwk.HttpsJwks - Updated JWKS content from https://abc.bfe.xyz/ will be cached for 3600 seconds until about Fri Mar 07 10:57:07 GMT 2025 -> [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}] +09:57:07.969 DEBUG o.j.k.r.HttpsJwksVerificationKeyResolverTest - We expected an exception out of the CustomHttpsJwksVerificationKeyResolver: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: There are multiple keys in the referenced JWK Set document, but the kid value was not provided in the JOSE Header.) while obtaining or using keys from JWKS endpoint at https://abc.bfe.xyz/ +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 4.865 s - in org.jose4j.keys.resolvers.HttpsJwksVerificationKeyResolverTest +[INFO] Running org.jose4j.keys.BigEndianBigIntegerTest +[INFO] Tests run: 19, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.739 s - in org.jose4j.keys.BigEndianBigIntegerTest +[INFO] Running org.jose4j.keys.KeyPairUtilTest +09:57:09.770 DEBUG org.jose4j.keys.KeyPairUtilTest - The following JWT and public key should be (and were on 11/11/15) usable and produce a valid result at jwt.io (related to http://stackoverflow.com/questions/32744172): +eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZWgiLCJleHAiOjE3NDEzNDI2MjksImp0aSI6IjRwRmRxUG95b0JOcnJYV0xRSEFSanciLCJhdWQiOiJ5b3UiLCJpc3MiOiJtZSJ9.mOz66sj3CDjJ-__-rAlchwKu0TpHptz5uvYHSAtjZ4mhL5gWOoaYXzAkt0dNseh2rLnTdU486aJrFFZ4FANnNDo9oZD5o0D3GtBcYLgrfgYp02Ydw-ojnBbu63l6JZNKrOE-wxq94Y4WVgv4kwuREfeP-97CGICbvEAatRReyUHa0Yg7yYTnRiqC2fhFHLg7TZWLG0bJ1vi_kkobP7cZof0EILcY5EdKDSFpbzcaZ60r8FTo4o8ThQ3jhaQ30zLhn1a_CD4-JnFvUmC9eWbDEl1EFjXYvqyyghlGTOrDGPbnc1X0n0TlbmGQlpAdIDdshydau3XFD-pnOlwL-6IMQQ +-----BEGIN PUBLIC KEY----- +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoahUIoWw0K0usKNuOR6H +4wkf4oBUXHTxRvgb48E+BVvxkeDNjbC4he8rUWcJoZmds2h7M70imEVhRU5djINX +tqllXI4DFqcI1DgjT9LewND8MW2Krf3Spsk/ZkoFnilakGygTwpZ3uesH+PFABNI +UYpOiN15dsQRkgr0vEhxN92i2asbOenSZeyaxziK72UwxrrKoExv6kc5twXTq4h+ +QChLOln0/mtUZwfsRaMStPs6mS6XrgxnxbWhojf663tuEQueGC+FCMfra36C9knD +FGzKsNa7LZK2djYgyD3JR/MB/4NUJW/TqOQtwHYbxevoJArm+L5StowjzGy+/bq6 +GwIDAQAB +-----END PUBLIC KEY----- +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.jose4j.keys.KeyPairUtilTest +[INFO] Running org.jose4j.keys.X509UtilTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.keys.X509UtilTest [INFO] Running org.jose4j.jws.EcdsaUsingShaTest -16:06:54.349 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4.UYhXg6IJKi20mwu62H0kdrEFxj0cC_nI8IJY_uZiQGXxRFvGtVDValbHbAxjeFkGVw-9gifxN4jtCm2-K0wF8_85hospe0YsE3UJALoj3XntK-ZuGo-iNt9BxAoUwnxv -16:06:54.384 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.AeNfrP1zDQERgIogpRlNmCjeiINE4vVvvuJULjh6E9t8Lpb5YSgNh914P7jo8sIHFB6UBxQ5fcR5IXtpBaWme1GpAB5A7eoAyuaTeLYpqFvd4arJ6qkNP8OXDomdAwlBXVkTpch6FygiSNSmFXVf9k-CkXlqkR5F1J5oR7MqY4xzIn8Y -16:06:54.418 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -16:06:54.419 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:54.420 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl -16:06:54.420 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:54.420 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:54.420 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 -16:06:54.421 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 -16:06:54.421 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 -16:06:54.421 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 -16:06:54.429 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.ASx46RexuuPaq4otUolhMZJRtOtCauo3yr-vzhgmgFZ1IdH9JRzDmbj7pJiUelADnD6NiFAqRnuZR9I5nlFCP1zJAGHY1qiuwshERSK26RvEtpRlP71pv5ABrEnEzX33mL5k6FdMLv_0QtMsDxGu6r5FLJOhdyJkbvq3spBwPiCo17LJ -16:06:54.464 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.OHPxOk-qDsgNDSyXVkp53WMRvJRYVpVAYjU_XvBSex0zWe2GE9nAF3YUtoGYe2APqB5b6k75FHyB9YRID9PvJg -16:06:54.480 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.480 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.483 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:54.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.484 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.486 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.489 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.489 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.489 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.490 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.490 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.490 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.490 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.490 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.495 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.499 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.504 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.508 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.508 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.508 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.508 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.509 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.509 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.510 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.510 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.510 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.510 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.510 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.510 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.510 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.511 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.511 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.511 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.511 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@47ad69f7 registered for zip algorithm DEF -16:06:54.511 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.511 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 31ms -16:06:54.526 DEBUG org.jose4j.jws.JwsTestSupport - ES256K eyJhbGciOiJFUzI1NksifQ.aw.EvmJ8OX2-CxMiJ6VDGnTc2Frmk6oyoYwj_PM3wRFk2WUZ62LX6-ot0RqQ2Ki_rLMzsgFKnit5FE8BBAlZDhtGg -16:06:54.531 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.531 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.531 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.532 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:54.532 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:54.532 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.532 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.532 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.532 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.532 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.533 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.533 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.533 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.533 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.534 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.534 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.534 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.534 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.534 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.535 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.535 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.536 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.537 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.537 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.538 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.538 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.538 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.538 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.538 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@36fcf6c0 registered for zip algorithm DEF -16:06:54.538 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.538 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -16:06:54.539 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.KcDOdSFx7Xu-zO5h3TYh31VIP8gTGrd3XNLCvnO63_hy69_amnJNcSziAQjR9NbBa4-5VjvGKHSljMzMAXt38w -16:06:54.555 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.555 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.555 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.555 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.555 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.555 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.555 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.555 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.556 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.556 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.557 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:54.557 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.557 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.557 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.559 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.562 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.562 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.563 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.563 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.563 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.563 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.563 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.568 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.572 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.576 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.581 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.582 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.583 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.583 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.583 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.583 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.583 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.583 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.584 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.584 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.584 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.584 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.584 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2d23faef registered for zip algorithm DEF -16:06:54.584 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.584 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 29ms -16:06:54.585 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.585 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.585 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.586 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.586 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.586 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.586 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.586 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.586 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.588 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.589 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.590 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.591 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.591 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.591 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.591 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.591 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.591 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.591 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7cb8437d registered for zip algorithm DEF -16:06:54.591 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.591 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.248 s - in org.jose4j.jws.EcdsaUsingShaTest -[INFO] Running org.jose4j.jws.EcdsaUsingShaAlgorithmTest -[0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 2] -[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest -[INFO] Running org.jose4j.jws.JwsUsingHmacSha256ExampleTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest -[INFO] Running org.jose4j.jws.EdDsaTest -16:06:54.623 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: Invalid point -16:06:54.626 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.TGl0dGxlIEVk.FlmPpn02cM1Bvi4v8IhVJSeZsis6jfkMpmvyTCBRd22e42DUWtHHPrqv_7goeF9sPDgmYR411ow_y1NRrEoXDw -16:06:54.650 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.QmlnIEVk.nNovkWEuHixtwMmj5YB6rWzUTKbulKtVB1aJA47wVRn_yd0aEo_UXyuulawPWvRshhUEPFlQ_YwA97_5ucpja2UQ1ensOCLyeQBrmHVVOfIkXE_VBv7H1tXc7QDCisPjmvO0d3C5wlhgyKZRoRKmgQQA -16:06:54.688 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.Q291c2luIEVkZGll.aRdEGzVTbgBT1UjAndQKzI_C_YV9UAjJJZRgLx4jOoFV3d__EH7_ziSdSRiXAtGbX9X0efxxj_Wi_kpVbSVZAw -16:06:54.694 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid -16:06:54.700 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.081 s - in org.jose4j.jws.EdDsaTest +09:57:09.932 DEBUG org.jose4j.jws.JwsTestSupport - ES384 eyJhbGciOiJFUzM4NCJ9.VGhlIHVtbGF1dCAoL8uIyoptbGHKinQvIFVVTS1sb3d0KSByZWZlcnMgdG8gYSBzb3VuZCBzaGlmdC4._b3-IG617YiaP6TqAIvMVvnbOG609t5J7uRVZa0CXSxJZRSzaIc8d32z3pIxXbyk8sAfkizvtIdKqQViE0RC7YjfAm_Ydp0T48lis15atDMnf9AWb8t3BEemRjH8UDbr +09:57:10.197 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.Pz8_Pz8.AZ6UKWks7teMZcXK_Xo0B8mEt8AUYRBWh_VBFEUPRgHLDPvFrVCGzEjuLM5Fxwu-NzdENaFrNpqqek67siuLsSKnATIBEmiJ-6M6ffeNrcLVOEFyZ7r-w87zpoq8U82xpxWfU1mmwxsVYjrmdyH9OI_QHboYe4SwUolHMhr5QtjZhu2l +09:57:10.444 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +09:57:10.444 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +09:57:10.444 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:10.445 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA256withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +09:57:10.445 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:10.445 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withECDSA/ES256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:10.445 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +09:57:10.445 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +09:57:10.445 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:10.451 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA384withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +09:57:10.452 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:10.452 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withECDSA/ES384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:10.452 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +09:57:10.452 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +09:57:10.452 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:10.452 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid for SHA512withECDSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.rsa.RSAPublicKeyImpl +09:57:10.452 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:10.452 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withECDSA/ES512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:10.453 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES256/SHA256withECDSA expects a key using P-256 but was P-521 +09:57:10.453 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-521 +09:57:10.453 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES384/SHA384withECDSA expects a key using P-384 but was P-256 +09:57:10.453 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: ES512/SHA512withECDSA expects a key using P-521 but was P-256 +09:57:10.508 DEBUG org.jose4j.jws.JwsTestSupport - ES512 eyJhbGciOiJFUzUxMiJ9.dG91Y2jDnw.AX38EyiTgkshDnTJZWO07_vp04GzSXg4VEnK-9S0rOeLwz6PswYIlt85BU8mkmow_w-Woi9R1k0EMsZlBmL57PArACMbg4wYDOXBFuVpOkFY4XuxdTq_PrIcaT8g81ZzSOTQxl5ATJdvmO9S8UondvSX71Ak_w5R91D9rX1wr2VVhf2N +09:57:10.893 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.UEFZTE9BRCEhIQ.Vw4Jm7CuVxWIo6Xn-FHba4n2omxE59hTeugzOBpCn7mgAIPq_VBoC6yvjMWDAe8r27El5OdKo0uKwc2UKjuOlA +09:57:11.056 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:11.056 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:11.056 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:11.057 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:11.057 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:11.057 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:11.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:11.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:11.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:11.072 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:11.097 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:11.097 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:11.097 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:11.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:11.130 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:11.141 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:11.179 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:11.179 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:11.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:11.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:11.182 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:11.189 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:11.190 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:11.190 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:11.190 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:11.212 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:11.240 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:11.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:11.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:11.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:11.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:11.286 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:11.296 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:11.298 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:11.308 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:11.308 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:11.308 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:11.308 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:11.308 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:11.309 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:11.332 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:11.333 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:11.333 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:11.333 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:11.333 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@506dcf55 registered for zip algorithm DEF +09:57:11.333 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:11.333 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 277ms +09:57:11.475 DEBUG org.jose4j.jws.JwsTestSupport - ES256K eyJhbGciOiJFUzI1NksifQ.aw.Xq4Ece3NopoNR4IxOYtLou2Z_q5QsI801MFzSgUCYXhAcUkok6lmdkPG5KjP27n54rjQNv5IFr0zKu6fCAd19A +09:57:11.517 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:11.518 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:11.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:11.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:11.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:11.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:11.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:11.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:11.518 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:11.526 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:11.528 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:11.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:11.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:11.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:11.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:11.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:11.530 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:11.539 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:11.539 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:11.541 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:11.541 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:11.542 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:11.542 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:11.542 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:11.542 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:11.542 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:11.556 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:11.557 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:11.567 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:11.569 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:11.569 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:11.569 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:11.569 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:11.579 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:11.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:11.588 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:11.588 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:11.588 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:11.588 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:11.588 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:11.588 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:11.588 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:11.588 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:11.588 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:11.588 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:11.588 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@22590e3e registered for zip algorithm DEF +09:57:11.588 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:11.589 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 71ms +09:57:11.596 DEBUG org.jose4j.jws.JwsTestSupport - ES256 eyJhbGciOiJFUzI1NiJ9.c29tZXRoaW5nIGhlcmU.-hoXJdOpSYFaVAyUy31WkCOH8RDkF_WZoTUiNITYHQabDzgiSEuSXRL7GUN5cqKnk342kxktPgM0F58w1SQJTQ +09:57:11.798 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:11.798 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:11.798 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:11.799 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:11.799 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:11.799 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:11.799 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:11.799 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:11.799 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:11.800 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:11.818 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:11.819 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:11.819 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:11.819 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:11.832 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:11.854 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:11.873 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:11.874 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:11.874 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:11.875 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:11.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:11.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:11.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:11.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:11.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:11.916 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:11.952 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:11.982 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:12.014 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:12.015 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:12.015 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:12.015 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:12.016 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:12.017 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:12.017 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:12.018 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:12.018 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:12.018 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:12.018 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:12.031 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:12.032 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:12.033 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:12.033 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:12.033 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:12.033 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@446c3920 registered for zip algorithm DEF +09:57:12.033 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:12.033 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 235ms +09:57:12.045 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:12.045 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:12.046 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:12.046 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:12.046 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:12.046 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:12.046 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:12.046 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:12.046 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:12.046 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:12.051 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:12.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:12.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:12.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:12.051 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:12.052 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:12.052 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:12.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:12.053 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:12.053 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:12.053 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:12.054 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:12.054 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:12.054 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:12.054 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:12.054 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:12.068 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:12.082 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:12.084 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:12.085 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:12.085 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:12.085 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:12.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:12.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:12.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:12.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:12.096 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:12.096 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:12.096 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:12.096 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:12.096 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:12.097 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:12.097 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:12.097 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:12.097 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:12.097 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2eaef76d registered for zip algorithm DEF +09:57:12.097 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:12.097 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 51ms +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.264 s - in org.jose4j.jws.EcdsaUsingShaTest +[INFO] Running org.jose4j.jws.JwsUnencodedPayloadOptionTest +09:57:12.194 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.095 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest +[INFO] Running org.jose4j.jws.DetachedContentTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.09 s - in org.jose4j.jws.DetachedContentTest +[INFO] Running org.jose4j.jws.HmacShaTest +09:57:12.332 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA +09:57:12.333 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo +09:57:12.334 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a +09:57:12.353 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 +09:57:12.367 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ +09:57:12.369 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw +09:57:12.384 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits +09:57:12.385 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +09:57:12.385 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits +09:57:12.385 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +09:57:12.386 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits +09:57:12.386 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits +09:57:12.386 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +09:57:12.387 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits +[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.044 s - in org.jose4j.jws.HmacShaTest [INFO] Running org.jose4j.jws.CritHeaderTest -16:06:54.702 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. -16:06:54.703 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). -16:06:54.703 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). -16:06:54.704 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. -16:06:54.704 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. -16:06:54.705 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +09:57:12.391 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'nope' marked as critical. +09:57:12.395 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.String). +09:57:12.395 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: crit header value not an array (class java.lang.Boolean). +09:57:12.396 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'http://example.com/UNDEFINED' marked as critical. +09:57:12.396 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. +09:57:12.413 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'urn:example.com:nope' marked as critical. [INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jws.CritHeaderTest +[INFO] Running org.jose4j.jws.RsaPssTest +09:57:12.427 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +09:57:12.438 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +09:57:12.450 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +09:57:12.510 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +09:57:12.522 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +09:57:12.533 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +09:57:12.588 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:12.588 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:12.588 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:12.594 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:12.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:12.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:12.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:12.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:12.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:12.595 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:12.598 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:12.599 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:12.599 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:12.599 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:12.603 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:12.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:12.613 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:12.613 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:12.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:12.614 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:12.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:12.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:12.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:12.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:12.616 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:12.628 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:12.641 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:12.652 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:12.668 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:12.668 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:12.668 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:12.668 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:12.669 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:12.670 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:12.671 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:12.671 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:12.671 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:12.671 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:12.671 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:12.672 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:12.672 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:12.673 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:12.673 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:12.673 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:12.673 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@56681eaf registered for zip algorithm DEF +09:57:12.673 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:12.673 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 85ms +09:57:12.691 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS +09:57:12.705 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@41fed14f):Signature object: SHA256withRSAandMGF1 +09:57:12.716 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS +09:57:12.729 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@3bae64d0):Signature object: SHA384withRSAandMGF1 +09:57:12.741 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS +09:57:12.766 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@36b310aa):Signature object: SHA512withRSAandMGF1 +09:57:12.789 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:12.789 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:12.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:12.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:12.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:12.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:12.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:12.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:12.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:12.789 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:12.790 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:12.792 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:12.792 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:12.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:12.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:12.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:12.794 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:12.794 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:12.794 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:12.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:12.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:12.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:12.796 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:12.796 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:12.796 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:12.796 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:12.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:12.800 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:12.802 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:12.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:12.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:12.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:12.803 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:12.804 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:12.804 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:12.804 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:12.804 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:12.805 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:12.805 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:12.805 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:12.805 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:12.805 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:12.805 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:12.805 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:12.805 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:12.805 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@76c387f9 registered for zip algorithm DEF +09:57:12.805 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:12.805 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 16ms +09:57:12.855 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:12.855 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:12.855 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:12.855 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:12.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:12.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:12.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:12.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:12.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:12.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:12.859 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:12.859 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:12.859 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:12.859 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:12.866 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +09:57:12.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +09:57:12.874 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +09:57:12.874 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:12.875 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:12.875 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:12.876 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:12.876 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:12.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:12.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:12.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:12.916 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:12.943 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:12.965 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:12.992 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:12.992 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:12.993 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:12.993 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:12.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:12.997 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:12.997 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:12.997 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:12.997 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:12.997 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:12.997 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:12.998 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:12.999 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:12.999 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:12.999 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:12.999 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:12.999 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@736048ed registered for zip algorithm DEF +09:57:12.999 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:12.999 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 144ms +09:57:13.000 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 +09:57:13.031 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 +09:57:13.063 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 +09:57:13.082 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:13.091 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:13.091 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:13.091 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:13.091 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:13.091 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:13.091 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:13.091 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:13.091 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:13.091 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:13.092 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:13.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:13.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:13.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:13.092 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:13.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:13.093 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:13.099 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:13.099 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:13.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:13.099 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:13.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:13.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:13.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:13.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:13.100 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:13.102 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:13.108 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:13.109 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:13.119 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:13.119 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:13.119 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:13.119 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:13.120 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:13.120 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:13.120 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:13.120 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:13.120 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:13.120 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:13.120 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:13.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:13.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:13.121 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:13.121 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:13.121 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:13.121 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1976f537 registered for zip algorithm DEF +09:57:13.121 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:13.121 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 30ms +09:57:13.457 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:13.457 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:13.457 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:13.458 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:13.458 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:13.458 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:13.458 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:13.458 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:13.466 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:13.467 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:13.479 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:13.479 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:13.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:13.480 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:13.487 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:13.500 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:13.512 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:13.513 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:13.513 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:13.513 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:13.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:13.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:13.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:13.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:13.524 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:13.559 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:13.588 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:13.620 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:13.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:13.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:13.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:13.664 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:13.665 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:13.666 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:13.669 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:13.669 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:13.669 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:13.669 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:13.669 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:13.670 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:13.671 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:13.671 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:13.671 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:13.671 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:13.671 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@47b179d7 registered for zip algorithm DEF +09:57:13.671 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:13.671 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 214ms +09:57:13.720 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:13.720 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:13.720 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:13.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:13.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:13.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:13.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:13.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:13.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:13.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:13.721 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:13.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:13.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:13.722 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:13.722 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:13.730 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:13.731 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:13.745 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:13.745 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:13.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:13.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:13.755 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:13.755 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:13.755 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:13.755 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:13.755 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:13.756 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:13.758 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:13.761 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:13.770 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:13.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:13.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:13.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:13.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:13.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:13.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:13.773 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:13.773 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:13.773 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:13.773 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:13.773 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:13.773 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:13.773 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:13.773 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:13.773 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:13.773 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@39008c9f registered for zip algorithm DEF +09:57:13.773 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:13.773 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 53ms +09:57:13.853 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:13.853 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:13.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:13.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:13.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:13.853 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:13.854 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:13.854 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:13.854 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:13.854 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:13.869 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:13.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:13.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:13.870 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:13.895 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 +09:57:13.911 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 +09:57:13.947 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 +09:57:13.947 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:13.948 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:13.948 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:13.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:13.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:13.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:13.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:13.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:14.003 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:14.047 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:14.091 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:14.131 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:14.132 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:14.132 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:14.132 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:14.133 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:14.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:14.146 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:14.147 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:14.147 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:14.147 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:14.147 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:14.148 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:14.149 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:14.149 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:14.149 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:14.150 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:14.150 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3402b4c9 registered for zip algorithm DEF +09:57:14.150 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:14.150 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 297ms +09:57:14.252 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:14.252 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:14.253 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:14.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:14.283 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:14.284 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:14.284 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:14.284 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:14.285 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:14.303 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:14.304 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:14.306 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:14.324 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:14.324 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:14.325 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:14.325 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:14.325 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:14.325 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:14.325 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:14.325 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:14.325 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:14.325 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:14.325 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:14.326 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:14.326 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:14.326 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:14.326 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:14.326 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:14.326 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@95bb2a2 registered for zip algorithm DEF +09:57:14.326 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:14.326 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 73ms +09:57:14.792 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:14.793 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:14.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:14.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:14.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:14.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:14.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:14.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:14.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:14.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:14.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:14.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:14.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:14.821 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:14.838 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:14.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:14.868 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:14.869 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:14.869 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:14.869 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:14.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:14.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:14.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:14.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:14.871 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:14.884 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:14.907 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:14.937 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:14.950 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:14.951 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:14.951 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:14.951 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:14.953 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:14.953 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:14.954 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:14.954 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:14.954 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:14.954 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:14.954 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:14.957 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:14.958 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:14.959 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:14.959 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:14.959 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:14.959 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@43a51d00 registered for zip algorithm DEF +09:57:14.959 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:14.959 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 166ms +09:57:14.962 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:14.962 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:14.962 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:14.962 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:14.962 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:14.962 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:14.962 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:14.962 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:14.962 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:14.962 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:14.967 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:14.967 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:14.967 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:14.967 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:14.967 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:14.968 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:14.969 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:14.970 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:14.970 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:14.970 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:14.970 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:14.973 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:14.973 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:14.973 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:14.973 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:14.973 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:14.975 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:14.976 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:14.977 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:14.978 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:14.978 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:14.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:14.980 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:14.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:14.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:14.981 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:14.981 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:14.981 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:14.981 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:14.981 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:14.981 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:14.981 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:14.982 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:14.982 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:14.982 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:14.982 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2e23c180 registered for zip algorithm DEF +09:57:14.982 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:14.982 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 20ms +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.555 s - in org.jose4j.jws.RsaPssTest +[INFO] Running org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.007 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest [INFO] Running org.jose4j.jws.PublicKeyAsHmacKeyTest -16:06:54.718 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.718 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.718 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.719 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:54.720 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.720 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.720 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.721 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.723 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.725 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.725 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.725 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.725 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.726 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.726 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.726 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.726 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.726 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.730 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.735 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.740 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.744 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.745 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.745 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.745 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.746 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.747 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.747 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@1ac45389 registered for zip algorithm DEF -16:06:54.747 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.747 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 29ms -16:06:54.747 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -16:06:54.747 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.747 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.747 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.748 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:54.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:54.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.748 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.749 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.749 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.749 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.749 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.749 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.749 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.749 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.749 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.750 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.751 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.752 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.753 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.753 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.753 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.753 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3e5d4f6b registered for zip algorithm DEF -16:06:54.753 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.753 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -16:06:54.764 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.764 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.764 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.764 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.764 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.764 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.764 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.764 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.764 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.764 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.766 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:54.766 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.766 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.766 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.768 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.769 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.771 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.771 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.771 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.772 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.777 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.781 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.785 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.790 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.790 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.790 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.790 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.790 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.791 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.791 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.791 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.791 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.791 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.791 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.791 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.792 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.792 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.792 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.792 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.792 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@62891fc8 registered for zip algorithm DEF -16:06:54.792 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.792 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 28ms -16:06:54.792 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -16:06:54.793 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.793 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.793 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.793 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.794 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.794 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.794 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.794 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.795 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.796 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.797 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.797 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.798 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.799 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.799 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.799 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.799 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.799 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.799 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.799 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.799 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.800 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.800 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.800 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.800 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@fca387 registered for zip algorithm DEF -16:06:54.800 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.800 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -16:06:54.810 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.810 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.810 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.812 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:54.812 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.812 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.812 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.814 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.816 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.817 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.817 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.818 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.818 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.818 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.818 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.818 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.818 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.819 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.823 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.827 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.832 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.836 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.837 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.837 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.837 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.837 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.837 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.837 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.837 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.838 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.838 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.838 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.838 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.838 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.838 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@55e3d6c3 registered for zip algorithm DEF -16:06:54.838 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.838 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 28ms -16:06:54.839 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -16:06:54.839 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.839 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.839 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.839 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.840 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.841 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.841 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.841 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.841 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.841 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.841 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.841 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.841 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.841 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.842 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.843 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.844 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.845 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.845 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.845 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.845 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.845 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.845 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.845 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.845 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.845 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.845 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@30e6a763 registered for zip algorithm DEF -16:06:54.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -16:06:54.856 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.856 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.856 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:54.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.858 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.860 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.861 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.863 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.863 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.863 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.863 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.864 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.868 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.873 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.877 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.882 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.882 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.882 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.882 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.882 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.883 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.883 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.883 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.883 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.883 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.883 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.883 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.883 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.884 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.884 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@38320e34 registered for zip algorithm DEF -16:06:54.884 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.884 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 28ms -16:06:54.884 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -16:06:54.884 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.884 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.884 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.885 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:54.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:54.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.885 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.886 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.886 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.886 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.886 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.886 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.886 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.887 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.887 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.887 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.887 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.887 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:54.887 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:54.888 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:54.889 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:54.890 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:54.890 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:54.890 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:54.890 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:54.890 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:54.890 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:54.891 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:54.891 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:54.891 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:54.891 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:54.891 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:54.891 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:54.891 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:54.891 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:54.891 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:54.891 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:54.891 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3d6a6bee registered for zip algorithm DEF -16:06:54.891 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:54.891 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -16:06:54.897 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -16:06:54.897 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. -16:06:54.899 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -16:06:54.899 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.191 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest -[INFO] Running org.jose4j.jws.DetachedContentTest -[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.009 s - in org.jose4j.jws.DetachedContentTest -[INFO] Running org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest -Payload -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.015 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest -[INFO] Running org.jose4j.jws.JwsPlaintextTest -16:06:54.927 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} -[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsPlaintextTest +09:57:15.038 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:15.038 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:15.038 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:15.039 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:15.040 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:15.040 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:15.040 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:15.040 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:15.040 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:15.041 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:15.045 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:15.045 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:15.045 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:15.045 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:15.050 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:15.054 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:15.058 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:15.059 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:15.059 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:15.059 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:15.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:15.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:15.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:15.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:15.061 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:15.074 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:15.084 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:15.104 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:15.132 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:15.132 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:15.132 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:15.132 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:15.133 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:15.134 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:15.145 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:15.145 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:15.145 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:15.145 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:15.145 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:15.155 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:15.156 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:15.157 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:15.157 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:15.157 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:15.157 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7ee3d262 registered for zip algorithm DEF +09:57:15.157 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:15.157 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 119ms +09:57:15.158 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +09:57:15.160 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:15.160 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:15.160 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:15.161 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:15.161 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:15.161 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:15.161 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:15.161 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:15.161 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:15.161 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:15.161 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:15.161 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:15.162 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:15.162 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:15.162 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:15.162 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:15.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:15.163 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:15.163 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:15.163 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:15.163 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:15.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:15.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:15.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:15.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:15.164 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:15.165 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:15.179 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:15.181 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:15.184 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:15.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:15.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:15.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:15.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:15.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:15.185 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:15.185 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:15.186 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:15.186 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:15.186 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:15.186 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:15.186 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:15.186 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:15.186 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:15.186 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:15.186 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@396e6d9 registered for zip algorithm DEF +09:57:15.186 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:15.186 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 26ms +09:57:15.223 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:15.223 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:15.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:15.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:15.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:15.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:15.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:15.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:15.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:15.224 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:15.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:15.230 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:15.230 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:15.230 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:15.243 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:15.253 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:15.266 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:15.266 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:15.268 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:15.269 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:15.271 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:15.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:15.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:15.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:15.272 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:15.289 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:15.304 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:15.321 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:15.346 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:15.346 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:15.346 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:15.346 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:15.350 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:15.352 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:15.352 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:15.352 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:15.352 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:15.352 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:15.352 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:15.353 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:15.353 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:15.354 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:15.354 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:15.354 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:15.354 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@e48bf9a registered for zip algorithm DEF +09:57:15.355 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:15.355 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 132ms +09:57:15.357 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +09:57:15.357 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:15.357 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:15.357 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:15.357 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:15.357 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:15.357 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:15.357 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:15.357 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:15.357 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:15.357 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:15.358 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:15.358 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:15.358 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:15.358 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:15.358 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:15.359 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:15.359 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:15.359 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:15.359 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:15.360 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:15.360 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:15.361 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:15.361 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:15.361 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:15.361 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:15.361 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:15.362 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:15.368 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:15.369 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:15.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:15.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:15.370 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:15.371 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:15.372 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:15.372 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:15.372 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:15.372 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:15.372 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:15.372 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:15.372 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:15.372 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:15.372 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:15.373 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:15.373 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:15.373 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:15.373 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7fb33394 registered for zip algorithm DEF +09:57:15.373 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:15.373 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 16ms +09:57:15.402 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:15.402 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:15.402 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:15.402 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:15.402 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:15.402 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:15.402 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:15.403 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:15.403 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:15.403 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:15.407 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:15.411 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:15.411 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:15.411 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:15.414 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:15.426 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:15.430 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:15.430 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:15.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:15.433 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:15.439 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:15.439 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:15.440 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:15.440 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:15.440 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:15.466 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:15.486 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:15.508 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:15.535 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:15.535 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:15.535 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:15.535 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:15.536 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:15.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:15.537 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:15.537 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:15.538 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:15.538 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:15.538 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:15.538 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:15.539 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:15.540 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:15.540 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:15.540 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:15.540 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5176d279 registered for zip algorithm DEF +09:57:15.540 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:15.540 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 138ms +09:57:15.541 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +09:57:15.541 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:15.541 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:15.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:15.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:15.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:15.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:15.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:15.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:15.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:15.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:15.541 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:15.541 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:15.542 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:15.542 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:15.542 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:15.542 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:15.543 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:15.551 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:15.551 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:15.552 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:15.552 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:15.552 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:15.552 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:15.553 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:15.553 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:15.553 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:15.554 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:15.564 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:15.566 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:15.568 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:15.568 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:15.568 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:15.568 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:15.568 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:15.569 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:15.569 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:15.569 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:15.569 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:15.569 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:15.569 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:15.569 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:15.569 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:15.569 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:15.569 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:15.570 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:15.570 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@373f7450 registered for zip algorithm DEF +09:57:15.570 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:15.570 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 29ms +09:57:15.645 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:15.645 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:15.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:15.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:15.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:15.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:15.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:15.645 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:15.646 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:15.646 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:15.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K +09:57:15.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:15.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:15.657 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:15.670 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:15.683 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:15.687 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:15.687 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:15.688 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:15.688 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:15.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:15.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:15.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:15.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:15.690 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:15.723 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:15.745 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:15.783 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:15.814 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:15.814 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:15.814 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:15.814 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:15.824 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:15.825 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:15.825 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:15.825 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:15.826 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:15.826 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:15.826 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:15.830 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:15.832 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:15.832 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:15.833 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:15.833 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:15.833 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@387bf2d9 registered for zip algorithm DEF +09:57:15.833 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:15.833 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 188ms +09:57:15.833 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +09:57:15.833 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... +09:57:15.834 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... +09:57:15.834 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none +09:57:15.834 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 +09:57:15.834 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 +09:57:15.834 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 +09:57:15.834 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA +09:57:15.834 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 +09:57:15.834 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 +09:57:15.834 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 +09:57:15.843 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@606e4010 +09:57:15.843 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. +09:57:15.843 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 +09:57:15.843 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 +09:57:15.843 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 +09:57:15.844 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 +09:57:15.844 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 +09:57:15.845 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 +09:57:15.845 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] +09:57:15.845 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 +09:57:15.845 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP +09:57:15.846 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 +09:57:15.846 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir +09:57:15.846 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW +09:57:15.846 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW +09:57:15.846 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW +09:57:15.849 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES +09:57:15.850 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW +09:57:15.856 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW +09:57:15.857 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW +09:57:15.857 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW +09:57:15.857 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW +09:57:15.857 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW +09:57:15.858 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW +09:57:15.858 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW +09:57:15.867 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW +09:57:15.867 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] +09:57:15.867 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 +09:57:15.867 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 +09:57:15.867 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 +09:57:15.867 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM +09:57:15.868 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM +09:57:15.868 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM +09:57:15.868 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] +09:57:15.868 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:15.868 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@74aa9c72 registered for zip algorithm DEF +09:57:15.868 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] +09:57:15.868 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 34ms +09:57:15.889 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +09:57:15.889 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.rsa.RSAPublicKeyImpl cannot be used for HMAC verification. +09:57:15.904 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +09:57:15.904 DEBUG o.jose4j.jws.PublicKeyAsHmacKeyTest - org.jose4j.lang.InvalidKeyException: class sun.security.ec.ECPublicKeyImpl cannot be used for HMAC verification. +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.894 s - in org.jose4j.jws.PublicKeyAsHmacKeyTest [INFO] Running org.jose4j.jws.JwsCryptoPrimitiveTest -16:06:54.927 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA -16:06:54.929 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA -16:06:54.934 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@9d7ccfe -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jws.JwsCryptoPrimitiveTest -[INFO] Running org.jose4j.jws.ChangingKeyTest -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.ChangingKeyTest +09:57:15.907 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withECDSA +09:57:15.912 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getSignature(): Signature object: SHA256withRSA +09:57:15.923 DEBUG o.jose4j.jws.JwsCryptoPrimitiveTest - cryptoPrimitive.getMac(): javax.crypto.Mac@5c20aab9 +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsCryptoPrimitiveTest [INFO] Running org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest -16:06:54.936 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", +09:57:15.927 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9X.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -16:06:54.937 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", +09:57:15.928 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9===.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -16:06:54.937 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", +09:57:15.930 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"typ":"JWT", "alg":"HS256"}->!!!!eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest -[INFO] Running org.jose4j.jws.GetPayloadTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.GetPayloadTest -[INFO] Running org.jose4j.jws.RsaPssTest -16:06:54.940 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -16:06:54.945 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -16:06:54.949 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -16:06:54.965 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -16:06:54.970 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -16:06:54.974 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -16:06:54.988 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:54.989 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:54.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:54.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:54.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:54.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:54.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:54.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:54.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:54.989 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:54.990 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:54.990 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:54.990 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:54.991 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:54.992 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:54.994 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:54.995 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:54.995 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:54.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:54.995 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:54.996 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:54.996 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:54.996 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:54.996 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:54.996 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.000 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.005 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.009 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.014 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.014 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.014 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.014 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.015 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.015 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.015 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.015 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.015 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.015 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.015 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.015 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.016 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.016 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.016 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.016 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.016 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@4bbb49b0 registered for zip algorithm DEF -16:06:55.016 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.016 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 27ms -16:06:55.023 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS256):Signature object: RSASSA-PSS -16:06:55.028 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@86733):Signature object: SHA256withRSAandMGF1 -16:06:55.033 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS384):Signature object: RSASSA-PSS -16:06:55.038 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@7fc7c4a):Signature object: SHA384withRSAandMGF1 -16:06:55.043 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/(PS512):Signature object: RSASSA-PSS -16:06:55.048 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS w/setSignatureAlgorithmOverride(org.jose4j.jca.ProviderContext$SignatureAlgorithmOverride@6b00ad9):Signature object: SHA512withRSAandMGF1 -16:06:55.053 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.053 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.053 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.054 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:55.054 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:55.054 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.054 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.054 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.054 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.054 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.055 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.055 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.055 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.055 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.055 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.055 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.055 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.055 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.055 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.056 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.057 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.058 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.059 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.059 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.059 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.059 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@338cc75f registered for zip algorithm DEF -16:06:55.059 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.060 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 7ms -16:06:55.070 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.070 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.070 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:55.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.071 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.073 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -16:06:55.075 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -16:06:55.076 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -16:06:55.076 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.076 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.076 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.077 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.077 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.078 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.078 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.078 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.082 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.086 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.091 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.095 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.096 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.096 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.096 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.096 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.096 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.097 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.097 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.098 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.098 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.098 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.098 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2f98635e registered for zip algorithm DEF -16:06:55.098 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.098 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 28ms -16:06:55.098 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA256withRSAandMGF1 -16:06:55.103 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA384withRSAandMGF1 -16:06:55.108 DEBUG org.jose4j.jws.RsaPssTest - Signature underlying JWS using legacy alg name system property:Signature object: SHA512withRSAandMGF1 -16:06:55.113 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.113 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.113 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.113 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.114 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.115 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.115 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.115 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.115 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.115 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.115 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.115 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.115 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.115 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.116 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.116 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.117 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.118 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.118 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.119 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.119 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.119 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.119 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.119 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.119 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@49c8f6e8 registered for zip algorithm DEF -16:06:55.119 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.119 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -16:06:55.143 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.143 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.143 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.143 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.143 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.143 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.143 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.144 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.144 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.144 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.145 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:55.145 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.145 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.145 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.147 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.149 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.150 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.150 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.151 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.156 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.160 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.165 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.169 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.169 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.169 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.169 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.170 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.170 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.171 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.171 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.171 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.171 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.171 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.171 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.171 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.172 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.172 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.172 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.172 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@771cbb1a registered for zip algorithm DEF -16:06:55.172 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.172 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 29ms -16:06:55.178 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.178 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.178 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.178 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.179 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.179 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.179 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.180 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.181 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.181 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.182 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.183 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.183 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.183 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.183 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.183 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.183 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.183 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.184 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.184 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.184 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.184 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.184 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2416498e registered for zip algorithm DEF -16:06:55.184 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.184 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -16:06:55.194 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.194 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.194 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.194 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.194 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.194 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.194 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.194 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.194 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.194 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:55.196 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.197 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.197 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.198 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|SHA256withRSAandMGF1) registered for alg algorithm PS256 -16:06:55.199 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|SHA384withRSAandMGF1) registered for alg algorithm PS384 -16:06:55.201 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|SHA512withRSAandMGF1) registered for alg algorithm PS512 -16:06:55.201 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.201 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.202 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.207 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.211 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.215 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.220 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.220 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.220 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.220 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.220 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.221 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.221 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.221 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.221 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.221 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.221 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.222 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.222 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.222 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.222 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.222 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.222 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@3659d7b1 registered for zip algorithm DEF -16:06:55.222 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.222 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 28ms -16:06:55.227 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.227 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.228 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.228 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.229 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.229 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.229 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.229 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.229 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.229 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.230 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.230 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.230 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.230 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.231 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.232 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.233 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.233 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.234 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.234 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.234 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.234 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.234 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@2015b2cd registered for zip algorithm DEF -16:06:55.234 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.234 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -16:06:55.256 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.256 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [BC version 1.8, SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.256 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.257 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.258 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256(ES256K|SHA256withECDSA) registered for alg algorithm ES256K -16:06:55.258 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.258 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.258 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.260 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.261 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.263 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.263 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, ES256K, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.263 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.264 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.264 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.264 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.269 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.273 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.277 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.282 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.283 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.283 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.283 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.283 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.283 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.283 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.283 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.283 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.284 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.284 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.284 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@73a19967 registered for zip algorithm DEF -16:06:55.284 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.284 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 28ms -16:06:55.285 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.285 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.285 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.285 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.286 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.286 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.287 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.287 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.287 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.288 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.289 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.289 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.290 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.291 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.291 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.291 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.291 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@5e746d37 registered for zip algorithm DEF -16:06:55.291 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.291 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 6ms -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.352 s - in org.jose4j.jws.RsaPssTest -[INFO] Running org.jose4j.jws.HmacShaTest -16:06:55.293 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.c29tZSBjb250ZW50IHRoYXQgaXMgdGhlIHBheWxvYWQ.qGO7O7W2ECVl6uO7lfsXDgEF-EUEti0i-a_AimulIRA -16:06:55.293 DEBUG org.jose4j.jws.JwsTestSupport - HS256 eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJodHRwczovL2p3dC1pZHAuZXhhbXBsZS5jb20iLAogICAgInBybiI6Im1haWx0bzptaWtlQGV4YW1wbGUuY29tIiwKICAgICJhdWQiOiJodHRwczovL2p3dC1ycC5leGFtcGxlLm5ldCIsCiAgICAiaWF0IjoxMzAwODE1NzgwLAogICAgImV4cCI6MTMwMDgxOTM4MCwKICAgICJodHRwOi8vY2xhaW1zLmV4YW1wbGUuY29tL21lbWJlciI6dHJ1ZX0.ZhkLsRIwT5xHXNgOpdFJ_7q5kqLd6sMiOOEV6kxTNCo -16:06:55.293 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.eyJtZWgiOiJtZWgifQ.fptKQJmGN3fBP_FiQzdAGdmx-Q5iWjQvJrLfdmFnebxbQuzOmzejBrzYh4MyS01a -16:06:55.294 DEBUG org.jose4j.jws.JwsTestSupport - HS384 eyJhbGciOiJIUzM4NCJ9.TG9va2luZyBnb29kLCBCaWxseSBSYXkh.wtlqZW8_eLF3hjMZT9c_kzg133b2b_JsR44bHGshc4w_BEUJApKerwEw9cltL8w9 -16:06:55.294 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.RmVlbGluZyBnb29kLCBMb3VpcyE.i4SAIaVYY4gxhqJxMvw3FKsar5RBCxzadaK2YT3HeeguWgJMLpDMu9cK1WxetjYmce49ZQmTxmB5nTbE_IgKHQ -16:06:55.295 DEBUG org.jose4j.jws.JwsTestSupport - HS512 eyJhbGciOiJIUzUxMiJ9.eyJtZWgiOiJtZWh2YWx1ZSJ9.NeB669dYkPmqgLqgd_sVqwIfCvb4XN-K67gpMJR93wfw_DylpxB1ell2opHM-E5P9jNKE2GYxTxwcI68Z2CTxw -16:06:55.296 DEBUG org.jose4j.jws.HmacShaTest - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 72 bits -16:06:55.296 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -16:06:55.296 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 384 bits for HS384) or larger MUST be used with the HMAC SHA algorithms but this key is only 376 bits -16:06:55.296 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -16:06:55.297 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 512 bits for HS512) or larger MUST be used with the HMAC SHA algorithms but this key is only 504 bits -16:06:55.297 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 8 bits -16:06:55.297 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -16:06:55.297 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 248 bits -[INFO] Tests run: 16, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jws.HmacShaTest +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.MaintainEncodedPayloadAndHeaderTest [INFO] Running org.jose4j.jws.EcdsaUsingShaEdgesTest -[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.097 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest -[INFO] Running org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jws.JwsUsingEcdsaP256Sha256ExampleTest -[INFO] Running org.jose4j.jws.JwsUnencodedPayloadOptionTest -16:06:55.409 DEBUG o.j.j.JwsUnencodedPayloadOptionTest - Expected exception because JWS Compact Serialization with unencoded non-detached payloads cannot have period ('.') characters : org.jose4j.lang.JoseException: per https://tools.ietf.org/html/rfc7797#section-5.2 when using the JWS Compact Serialization, unencoded non-detached payloads using period ('.') characters would cause parsing errors; such payloads MUST NOT be used with the JWS Compact Serialization. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s - in org.jose4j.jws.JwsUnencodedPayloadOptionTest +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.658 s - in org.jose4j.jws.EcdsaUsingShaEdgesTest +[INFO] Running org.jose4j.jws.GetPayloadTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jws.GetPayloadTest +[INFO] Running org.jose4j.jws.JwsPlaintextTest +09:57:16.641 DEBUG org.jose4j.jws.JwsPlaintextTest - {"auth_time":1339613248,"exp":1339613548,"iss":"https:\/\/example.com","aud":"a","jti":"jIA8qa35AroV6iP2q4wRAl","user_id":"john","iat":1339613248,"acr":3} +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jws.JwsPlaintextTest +[INFO] Running org.jose4j.jws.EdDsaTest +09:57:16.715 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: Invalid point +09:57:16.755 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.TGl0dGxlIEVk.P-KlXm1AaJLD0eSCU7gpKMcQhAB1N4vsp8xkmdyhm3YXweJ28Vrsxo5thwY67YwMb2u_iaR75A3iWa6szviaBg +09:57:16.920 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.QmlnIEVk.E_1G0NQhtT-m01e2RMuwcC6U34GC-64fpn1l6PaLfZVmYKwJkIMEIzUdoUfbZiucIrpDB8w3LVUA8OlfVkHWvht6JtWu835tWEGT3r1b5nGm4dvhJ8otERDQngTAnbt5EGnsd6EzV1K0lUk27dpLiQoA +09:57:17.168 DEBUG org.jose4j.jws.JwsTestSupport - EdDSA eyJhbGciOiJFZERTQSJ9.Q291c2luIEVkZGll.4ZcKceigKnMZbKGraLv9vx_7s4uHE38w1Gf5ovXMersnSxpWbUFFxBCz96CF9INWk_4DAeLoCbisNwDXMaXKDA +09:57:17.209 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid +09:57:17.248 DEBUG org.jose4j.jws.EdDsaAlgorithm - Problem verifying EdDSA signature: java.security.SignatureException: signature length invalid +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.593 s - in org.jose4j.jws.EdDsaTest +[INFO] Running org.jose4j.jws.EcdsaUsingShaAlgorithmTest +[0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 2] +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.148 s - in org.jose4j.jws.EcdsaUsingShaAlgorithmTest +[INFO] Running org.jose4j.jws.JwsUsingHmacSha256ExampleTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.012 s - in org.jose4j.jws.JwsUsingHmacSha256ExampleTest +[INFO] Running org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest +Payload +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.125 s - in org.jose4j.jws.JwsUsingEcdsaP521Sha512ExampleTest +[INFO] Running org.jose4j.jws.ChangingKeyTest +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.012 s - in org.jose4j.jws.ChangingKeyTest +[INFO] Running org.jose4j.jws.JwsUsingRsaSha256ExampleTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.049 s - in org.jose4j.jws.JwsUsingRsaSha256ExampleTest [INFO] Running org.jose4j.jws.JwsPayloadVariationsTest -16:06:55.427 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. -[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jws.JwsPayloadVariationsTest +09:57:17.805 DEBUG o.j.jws.JwsPayloadVariationsTest - Expected: org.jose4j.lang.IntegrityException: JWS signature is invalid. +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.157 s - in org.jose4j.jws.JwsPayloadVariationsTest [INFO] Running org.jose4j.jws.RsaUsingShaTest -16:06:55.476 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.QVeS6Eo3c9ffThZ3-LDm-6YCkyI8B_kKkBudM3JXtc7ho9zV6wPLxumOnN2VpWtU4wgSxQqhdjrbsLrPoQiB_J-4xk5CJRnKpHWG1efmVrBodbP8jX6DwYu9huUKCj9vT_F82SGD-O2YuvVzKCg2cgzwGvHhwhk3NZ5lkK5Pbbpf2qBgC-raDnqlUJNvlY4QdoVzHxgux8W8MhfKAoBduHVq49Nd2SyMXqD3bm7EVttV-RjRooyvEME1TKZ6TkLGooQeXsN_A58E9o0qc_tfLvKWR3WyIq1zbWNEa1DYNnHYuHC3979YvEEGHaM1GSSL9kdZbVmJUOR6G0zJkCfNXw -16:06:55.483 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.gk-GsWV3qQu3rbYDy82SI4ZjaP4cCvhd34i7CIBxVzzdbqixkNkAoMAmSQ-pKOwIw_ZQeYcjFxhmJTAoV3b6dOYdnaNhIcjSx_8rZTNnWph86d5YOaIITxeeRXWgWw4vZHm9vNqpr1B1Y-pB86Ty8kHOT4tOhcv3cV7dwVLbHKNw-nreM1HynglsvmSTWzYJQnpqDqE4RT5OqCxcW8pLwiCimWtiMuuWTIlIEYv3RfktDvk-U6g3trQ-xbcq2b-H5_U3RGigi97IzAwwZy4d_6tkqInK1rA3FSwRVcpc0ti1etV1S6i2ViXH366oNj00lvrDt3E0U55rjZ--S6FkdA -16:06:55.490 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.bLvEtdJSHwwQgSBjv0htfRBh1L_zc6KOHITtGRaeq7lvIERQHGOj8GfvWEF9o84sZ1JKXc8FG5BFB6Z4XXZ4TFSIJ_tk01NCvXfijYdHgki3XSOyp4TsIDz2P4JxFHoZUfZKS3_pyBjrMqtKghs6g6-cBm5GaDs7nXPvFTgSRqr3znQXycj_CMh4OaV6PjqEp8mMCIiTW_XlWnM2VIkl6Y_rq3RDbnCjUgWrgu6mqIU9yKwJkMoRJEDn-Pepx8PfCTFBBB-mB_A_Qw7zkCpcqd5IWAAqYTjkKthenFvgTGCHV2ZR1zBiARoo3I6rhIoXX-2gBHISPPrbeGsrG1yP6g -16:06:55.505 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -16:06:55.505 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -16:06:55.505 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -16:06:55.505 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -16:06:55.505 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:55.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:55.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:55.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:55.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:55.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -16:06:55.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -16:06:55.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -16:06:55.506 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -16:06:55.507 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') -[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.079 s - in org.jose4j.jws.RsaUsingShaTest -[INFO] Running org.jose4j.lang.ByteUtilTest -16:06:55.509 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length -16:06:55.509 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length -16:06:55.509 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length -16:06:55.509 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length -16:06:55.510 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length -16:06:55.510 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length -16:06:55.510 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length -16:06:55.510 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length -[INFO] Tests run: 31, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.lang.ByteUtilTest -[INFO] Running org.jose4j.lang.JsonHelpTest -[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.lang.JsonHelpTest -[INFO] Running org.jose4j.lang.MathsTest -[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.lang.MathsTest -[INFO] Running org.jose4j.jca.ProviderContextTest -16:06:55.524 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.524 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.8] security providers installed)... -16:06:55.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.524 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.524 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:55.525 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:55.525 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.525 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.525 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.526 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.528 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.529 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.529 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.529 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.529 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.529 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.529 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.530 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.530 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.530 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.534 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.539 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.544 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.548 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.549 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.549 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.549 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.549 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.549 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.549 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.549 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.549 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.549 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.549 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.549 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@470a659f registered for zip algorithm DEF -16:06:55.549 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.549 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 25ms -16:06:55.560 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.560 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.561 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.561 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.562 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.562 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.562 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.563 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.564 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.565 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.566 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.566 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.566 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.566 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@6ec65b5e registered for zip algorithm DEF -16:06:55.566 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.566 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 5ms -16:06:55.582 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.582 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21, BC version 1.8] security providers installed)... -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.582 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.582 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.583 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.585 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.587 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.587 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.587 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.591 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.596 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.600 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.605 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.605 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.606 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.606 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.606 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.606 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.606 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@7afb1741 registered for zip algorithm DEF -16:06:55.606 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.606 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 24ms -16:06:55.608 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Reinitializing jose4j... -16:06:55.608 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initializing jose4j (running with Java 21.0.6 from Debian at /usr/lib/jvm/java-21-openjdk-amd64 with [SUN version 21, SunRsaSign version 21, SunEC version 21, SunJSSE version 21, SunJCE version 21, SunJGSS version 21, SunSASL version 21, XMLDSig version 21, SunPCSC version 21, JdkLDAP version 21, JdkSASL version 21, SunPKCS11 version 21] security providers installed)... -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.UnsecuredNoneAlgorithm(none|null) registered for alg algorithm none -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha256(HS256|HmacSHA256) registered for alg algorithm HS256 -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha384(HS384|HmacSHA384) registered for alg algorithm HS384 -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.HmacUsingShaAlgorithm$HmacSha512(HS512|HmacSHA512) registered for alg algorithm HS512 -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EdDsaAlgorithm(EdDSA|EdDSA) registered for alg algorithm EdDSA -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP256UsingSha256(ES256|SHA256withECDSA) registered for alg algorithm ES256 -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP384UsingSha384(ES384|SHA384withECDSA) registered for alg algorithm ES384 -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.EcdsaUsingShaAlgorithm$EcdsaP521UsingSha512(ES512|SHA512withECDSA) registered for alg algorithm ES512 -16:06:55.608 DEBUG o.j.j.EcdsaUsingShaAlgorithm$EcdsaSECP256K1UsingSha256 - ES256K is not available due to org.jose4j.lang.JoseException: Problem creating signature.; caused by: java.security.SignatureException: Curve not supported: java.security.spec.ECParameterSpec@7a8c8dcf -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - ES256K is unavailable so will not be registered for alg algorithms. -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha256(RS256|SHA256withRSA) registered for alg algorithm RS256 -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha384(RS384|SHA384withRSA) registered for alg algorithm RS384 -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaSha512(RS512|SHA512withRSA) registered for alg algorithm RS512 -16:06:55.608 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha256(PS256|RSASSA-PSS) registered for alg algorithm PS256 -16:06:55.609 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha384(PS384|RSASSA-PSS) registered for alg algorithm PS384 -16:06:55.609 DEBUG o.j.j.AlgorithmFactory->JsonWebSignatureAlgorithm - org.jose4j.jws.RsaUsingShaAlgorithm$RsaPssSha512(PS512|RSASSA-PSS) registered for alg algorithm PS512 -16:06:55.609 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWS signature algorithms: [none, HS256, HS384, HS512, EdDSA, ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512] -16:06:55.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$Rsa1_5(RSA1_5|RSA/ECB/PKCS1Padding) registered for alg algorithm RSA1_5 -16:06:55.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep(RSA-OAEP|RSA/ECB/OAEPWithSHA-1AndMGF1Padding) registered for alg algorithm RSA-OAEP -16:06:55.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.RsaKeyManagementAlgorithm$RsaOaep256(RSA-OAEP-256|RSA/ECB/OAEPWithSHA-256AndMGF1Padding) registered for alg algorithm RSA-OAEP-256 -16:06:55.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.DirectKeyManagementAlgorithm(dir|null) registered for alg algorithm dir -16:06:55.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes128(A128KW|AESWrap) registered for alg algorithm A128KW -16:06:55.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes192(A192KW|AESWrap) registered for alg algorithm A192KW -16:06:55.609 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesKeyWrapManagementAlgorithm$Aes256(A256KW|AESWrap) registered for alg algorithm A256KW -16:06:55.610 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementAlgorithm(ECDH-ES|ECDH) registered for alg algorithm ECDH-ES -16:06:55.611 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes128KeyWrapAlgorithm(ECDH-ES+A128KW|N/A) registered for alg algorithm ECDH-ES+A128KW -16:06:55.612 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes192KeyWrapAlgorithm(ECDH-ES+A192KW|N/A) registered for alg algorithm ECDH-ES+A192KW -16:06:55.612 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithm$EcdhKeyAgreementWithAes256KeyWrapAlgorithm(ECDH-ES+A256KW|N/A) registered for alg algorithm ECDH-ES+A256KW -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha256Aes128(PBES2-HS256+A128KW|n/a) registered for alg algorithm PBES2-HS256+A128KW -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha384Aes192(PBES2-HS384+A192KW|n/a) registered for alg algorithm PBES2-HS384+A192KW -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithm$HmacSha512Aes256(PBES2-HS512+A256KW|n/a) registered for alg algorithm PBES2-HS512+A256KW -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes128Gcm(A128GCMKW|AES/GCM/NoPadding) registered for alg algorithm A128GCMKW -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes192Gcm(A192GCMKW|AES/GCM/NoPadding) registered for alg algorithm A192GCMKW -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->KeyManagementAlgorithm - org.jose4j.jwe.AesGcmKeyEncryptionAlgorithm$Aes256Gcm(A256GCMKW|AES/GCM/NoPadding) registered for alg algorithm A256GCMKW -16:06:55.613 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE key management algorithms: [RSA1_5, RSA-OAEP, RSA-OAEP-256, dir, A128KW, A192KW, A256KW, ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW, ECDH-ES+A256KW, PBES2-HS256+A128KW, PBES2-HS384+A192KW, PBES2-HS512+A256KW, A128GCMKW, A192GCMKW, A256GCMKW] -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes128CbcHmacSha256(A128CBC-HS256|AES/CBC/PKCS5Padding) registered for enc algorithm A128CBC-HS256 -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes192CbcHmacSha384(A192CBC-HS384|AES/CBC/PKCS5Padding) registered for enc algorithm A192CBC-HS384 -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesCbcHmacSha2ContentEncryptionAlgorithm$Aes256CbcHmacSha512(A256CBC-HS512|AES/CBC/PKCS5Padding) registered for enc algorithm A256CBC-HS512 -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes128Gcm(A128GCM|AES/GCM/NoPadding) registered for enc algorithm A128GCM -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes192Gcm(A192GCM|AES/GCM/NoPadding) registered for enc algorithm A192GCM -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->ContentEncryptionAlgorithm - org.jose4j.jwe.AesGcmContentEncryptionAlgorithm$Aes256Gcm(A256GCM|AES/GCM/NoPadding) registered for enc algorithm A256GCM -16:06:55.613 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE content encryption algorithms: [A128CBC-HS256, A192CBC-HS384, A256CBC-HS512, A128GCM, A192GCM, A256GCM] -16:06:55.613 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - -16:06:55.613 DEBUG o.j.j.AlgorithmFactory->CompressionAlgorithm - org.jose4j.zip.DeflateRFC1951CompressionAlgorithm@263bbfeb registered for zip algorithm DEF -16:06:55.613 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - JWE compression algorithms: [DEF] -16:06:55.613 DEBUG o.jose4j.jwa.AlgorithmFactoryFactory - Initialized jose4j in 5ms -[INFO] Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.164 s - in org.jose4j.jca.ProviderContextTest +09:57:18.766 DEBUG org.jose4j.jws.JwsTestSupport - RS256 eyJhbGciOiJSUzI1NiJ9.UEFZTE9BRCEhIQ.cr6AUoHW5TVIFw78guBMxCq8_sDlD9fveSeYtfAfIf_DfteX6DvBrzL7d3JGMwOdKfRM03P_tm5gBzlzNmXkgGvL20FnCDA95WnREhMASUsCcxiCFewq_86rARyph2RY0EnO5GbiME-AjCcotdY7agpVyqrSk6umNHc92ES8U-hcMQIV64Ebk40D2xMkoLtaBNj8upgSwfWQpB3ew_h7g1EWHXlXOgQd_M699oHBOImfDoLncwj6RRMIQF-7H8YOACIlahObWQ9PMiIJ5C30MNKRJ4hpT2-Cnw_3eNl6X0tPMSRAnLfaz1w_mfBvFPT4OHi2R1oaorMFZIumuCvGYg +09:57:18.811 DEBUG org.jose4j.jws.JwsTestSupport - RS384 eyJhbGciOiJSUzM4NCJ9.UEFZTE9BRCEh.KI-1eHlsrex-wmIKwOjmnGHexJqh8iGtHwc1YJtBxvy-97M05bYGMKst-dQQi8KtaEodWhcLzrfLRiZaLNp6HVvurMtyvn4D79BMQ5WCGBXnadqRwu3qxZ7jLBAd0uMul6KH7KVIn4FelOO48LZtV8p735g7NdroT5V74IpiXp4U5KAATc9y3Jq1s0myW5OgPemwaD8HhhBCpMbAeKHkFl7AFDeQr0AEnVqNfIKTTG_m-W-pJgd3_RKMpclFvaXNenJ_4WXkyvb9UNZpVpg0fyxdIo-3dQVLvAyyg5KXv1KtPJS4A-uXpj6Oye4iWhQdT9LJftgjxPxU41SMrgiScQ +09:57:18.848 DEBUG org.jose4j.jws.JwsTestSupport - RS512 eyJhbGciOiJSUzUxMiJ9.UEFZTE9BRCE.Ny9paplnxcrm_AkApRNJ42tByRioRSis7wJH8-uPbh878goBgR5fxlDUZd8nAiQ-PPm-RprtcirikQZtGleLfB9nf1T9oQ_fTFE0C8uCLQK-n3Tmz9vbCqGnxP0xzn14LrVm7DoshtsrCAasDGdHJMlvOobOcX9nOcSi4ad35A4YQyEGTxn70aGyaZqhzee2Obz-_ylBe8IaQNr9Pg-2b8j5DaY6Kp4bQfK4wQ9TuvWypg39r-oFi3VHJTaynlkIWhgFbIsb098pD7G2Bt4Kp9Cr0G1xaKwxlW02t9VYNqHMaF1jZKVlQOnj42K49YoMvjuJzY8LXG-8aUpJ83hkWg +09:57:19.041 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +09:57:19.041 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +09:57:19.042 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +09:57:19.042 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +09:57:19.042 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:19.050 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:19.051 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA256withRSA/RS256 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA384withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:19.052 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA384withRSA/RS384 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:19.053 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). +09:57:19.053 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateCrtKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateCrtKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +09:57:19.053 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=RSA) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.rsa.RSAPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.rsa.RSAPrivateKeyImpl and java.security.PublicKey are in module java.base of loader 'bootstrap') +09:57:19.053 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: Key cannot be null +09:57:19.053 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=HMAC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class org.jose4j.keys.HmacKey cannot be cast to class java.security.PublicKey (org.jose4j.keys.HmacKey is in unnamed module of loader 'app'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:19.053 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:19.053 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA512withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:19.054 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +09:57:19.054 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid (not a public key or is the wrong type of key) for SHA512withRSA/RS512 java.lang.ClassCastException: class sun.security.ec.ECPrivateKeyImpl cannot be cast to class java.security.PublicKey (sun.security.ec.ECPrivateKeyImpl is in module jdk.crypto.ec of loader 'platform'; java.security.PublicKey is in module java.base of loader 'bootstrap') +[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.213 s - in org.jose4j.jws.RsaUsingShaTest [INFO] Running org.jose4j.cookbook.JoseCookbookTest -[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.195 s - in org.jose4j.cookbook.JoseCookbookTest +[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.796 s - in org.jose4j.cookbook.JoseCookbookTest +[INFO] Running org.jose4j.json.JsonUtilTest +{"char array":["a","\\","\""],"some object":"java.lang.Object@367b22e5","nested":{"chars":["\"","m","e","h"]},"nested also":{"obj":"java.util.Random@fca387"}} +09:57:19.890 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.util.Map (java.util.ArrayList and java.util.Map are in module java.base of loader 'bootstrap') +09:57:19.890 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Boolean cannot be cast to class java.util.Map (java.lang.Boolean and java.util.Map are in module java.base of loader 'bootstrap') +09:57:19.890 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.String cannot be cast to class java.util.Map (java.lang.String and java.util.Map are in module java.base of loader 'bootstrap') +09:57:19.890 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Expecting a JSON object at the root but java.lang.ClassCastException: class java.lang.Long cannot be cast to class java.util.Map (java.lang.Long and java.util.Map are in module java.base of loader 'bootstrap') +09:57:19.890 DEBUG org.jose4j.json.JsonUtilTest - Expected: org.jose4j.lang.JoseException: Parsing returned null +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.json.JsonUtilTest +[INFO] Running org.jose4j.jwa.AlgorithmConstraintsTest +[INFO] Tests run: 8, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwa.AlgorithmConstraintsTest +[INFO] Running org.jose4j.jwa.AlgorithmFactoryTest +[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwa.AlgorithmFactoryTest +[INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest +09:57:20.040 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:22.838 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithmTest - Expected exception because this tests going over the max allowed size of decompressed data org.jose4j.lang.JoseException: Maximum allowed size of decompressed data exceeded (which is 204800 bytes but configurable with the org.jose4j.zip.decompress-max-bytes system property) +09:57:22.847 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:22.848 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +09:57:22.848 DEBUG o.j.z.DeflateRFC1951CompressionAlgorithm - +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 2.02 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest +[INFO] Running org.jose4j.examples.ExamplesTest +eyJhbGciOiJFUzI1NiJ9.VGhpcyBpcyBzb21lIHRleHQgdGhhdCBpcyB0byBiZSBzaWduZWQu.9UZmOL44_oxzvhBfPJ1KQd9Nhq8u3rGHsyIAY5lJtOZUFqgIHeh-4nq8qWij-oH7w8bCIyfBMwNquoJyfJwbKw +JWS Signature is valid: true +JWS payload: PAYLOAD! +Serialized Encrypted JWE: eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0.d0jLGWEYmqZl595tSxC3llvW7Ll0matHQVrcfen7PCVmv0kZXmYCag.5tBZWgzGY9zXs_nrmenk_g.fCicVcPsuZOglv-CDtFMyA.uV2FCcosg6RKsZNX8tR3xw +Payload: Hello World! +JWS Signature is valid: true +JWS payload: This is some text that is to be signed. +JWT: eyJraWQiOiJrMSIsImFsZyI6IlJTMjU2In0.eyJpc3MiOiJJc3N1ZXIiLCJhdWQiOiJBdWRpZW5jZSIsImV4cCI6MTc0MTM0MjA0MywianRpIjoibmdfNlVmMDU4UkRhVUdzWk5lQWN1dyIsImlhdCI6MTc0MTM0MTQ0MywibmJmIjoxNzQxMzQxMzIzLCJzdWIiOiJzdWJqZWN0IiwiZW1haWwiOiJtYWlsQGV4YW1wbGUuY29tIiwiZ3JvdXBzIjpbImdyb3VwLW9uZSIsIm90aGVyLWdyb3VwIiwiZ3JvdXAtdGhyZWUiXX0.ewS4vOxXYsXaLCkkogN0xhJNBrU2-LYkDREKeiLdCN-RR9MaLLIQrV7Ns0CIC2bnhKCAqgqitKAgg40O5WrDgfgG94yj-g6sTeg1euEFOAzCTxEO85VaMJ4EXVpC1zOF7QmZNx1xW1mOgV2LSAhPEWD927v7Bu1NOP_sDPn2_LBpDM0MaWHGamCikSWMlhPufROGTggkMspp5_jjhNu_Tp0cb3Rk-wKq7p3MKghb9loK848XhT4osJCaYW9EI_Yek8r0wWdsG1-TCYXjcXnycePviin3JKSjlVau-5_5hBvZ_P01ea-bMO77r1vg7hchW1pqjV_zPE5nRqAUF6pKXQ +JWT validation succeeded! JWT Claims Set:{iss=Issuer, aud=Audience, exp=1741342043, jti=ng_6Uf058RDaUGsZNeAcuw, iat=1741341443, nbf=1741341323, sub=subject, email=mail@example.com, groups=[group-one, other-group, group-three]} +JWT: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyZWNlaXZlcidzIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJSVEg0M3hlc0dhRGJ4ZEthM1B1Tmx2aFRzVGFfRndNNFNPNkFsM3BjVVprIiwieSI6IkM4ZFloSzEwRWRPaV9NUVFTVWlhN05ERDZPUUdxRkxUZW1vRmpGZUF0aUkiLCJjcnYiOiJQLTI1NiJ9fQ.tyfOZ4CvkTAtAFivexOxix1w_hBCq4nT7smdf31IqQbTD4RipOKeAQ.-XMGNSl3GaO8sNBUNr3PTw.eaF6Csp0kEQ2VDk568AYoWijAmI5Unb-XoxRrXyDaohlSiD9W3-4TARKYRXiLNuWUfVIm7YzRnr5_7lH8ssymApL_x5YCkQbZTGxbx9dN9qfFl8_OHGaiLoio42DNs9Wk_gPqwUdRPbhWuBc7PvD8Ojc-ZExgtsMQm62jheDbENHkb5VIlVAUyhJqBwMs-2n_COh8l_F4r8UJTEv6G-2N5He4EbKJpqasvnEggP7i2jDt6VGGhl6MfuA1K0fUm7E9dK6yA_TsmCIP8BmtLLTQ2IwLg0zJ-5viekePIYaOVRCb19A0HAO_wJA3XrWzBnXaMRlos5gePbFch8NQ0GSRr4XnpoTApSl_HgwTiI3ROWICcTJZfeJGbUwSQP0uxRYuEmQhBZ6qCe4a2g3Y0mLOwy66jJwQ4fNRl9JL0rlk5FUGvVfB_VuQ2o5K_nGaa1JmHP9qBhd3OfJsTELjb0tz5mFBBmJ1pM1MFrY0YkIj9MSXPcj1RHZ4PZUSStfahPhHhWVLIJpQNt19gQV96_L0j3fvUO2KZ9KBhwM0mU0_hE.zyOnZwla3Ma1CYbXy1Pa2Q +JWT validation succeeded! JWT Claims Set:{iss=sender, aud=receiver, exp=1741342043, jti=TQxhXY1iyr-QiMeb8p5SDg, iat=1741341443, nbf=1741341323, sub=subject, email=mail@example.com, groups=[group-1, other-group, group-3]} +JWE compact serialization: eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..mA2Hm2I-sSxuhvu3xdha5A.2-NIsB4wCXgB29Gs30ite3lw-VtTPs5-t3zvtRkDb7uyvWdF_0MidWP_jccXBLkYxGKLE8jzArJkHmeWmjy1oQ.ax3OubaJcizFWS8jrE0cZA +plaintext: Well, as of this moment, they're on DOUBLE SECRET PROBATION! +eyJhbGciOiJFUzI1NiIsImtpZCI6ImV4YW1wbGUiLCJiNjQiOmZhbHNlLCJjcml0IjpbImI2NCJdfQ..auPIYnNNRxaYF0bT-v57y5AR6U4fDFWfeqXSbjzVvgykiJDIIJaq2zkY6P_tdgqB6JdWoYSzflL00ho7ORQ59w +this is the content that will be signed +JWS Signature is valid: true +JWT: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6InJlY2VpdmVyIGtleSIsImN0eSI6IkpXVCIsImVwayI6eyJrdHkiOiJPS1AiLCJjcnYiOiJYMjU1MTkiLCJ4IjoiT19vcEpYdHdYUFRhWVV6cEFSbXlSczBRQUhNUm9vUGxkUndPblFLX0RpOCJ9fQ..ZzbvXJ6_-iLJIIdqnRlzXg.MTeLXZFMW1VX1mBCVTUlo0B07SNyv9cudYke8H4NmWdSFAdKeIELK7afAHGicMrJyZ-sApB3alAsRXVLzgQqwyGeZRBQR0XkjuZSLJf19OVToUXpuCWLZBGgvAKaSoLOsZWbQmyq00HUwCbt1z01Y5qR8fUaM1daXOnK9XtB31G31d9RzaHXfQpj1m1V4RLrgxtXPDBBe16aHicitGhsXtMUv44iA29buPpvMWLuyhlN8ZQx2oD5ZYs3bf_Kd1k6pPa8OjA4mHx1rxUgmulkR2LKuP4z_REdrUzvRPB2SY_vZa7VCbVqw8QysVCYcDFqhC5--S5GvP1DDipXkMQxlnqWNgKZjgiooQIQdCuqkQkg-gaD7WQeBA-3toni3WT-lPljYysD8RiwrgeWJgPMEXhs-BvRal-IlyUeiO_VJps_WkpwsmsqReRvya76wLHA2TVwF47LO27DNsFpWKz17ir3QXEv_sPoYhiSK5V8DE-i7_ByuI0ueQXK-HywwU0xrFPfEvvK35il-2SkOpddzsA09_wT17pj4BJBTqi7cfue9dbzxF1L-Ileht-tV0jbsouzlfMOdDzKOJak_sDTtXD9KP0Gq66l_6DdMY3xGDK-G6kSAg16YRpNZD-B8TXOXU7NfKXCeLQCZhqYAEqw2nZAbZquk4L5qUCH2V2tM6J2vm2D0EpTQBGusv2SEGcjLfT_5dugv-5qADqRRY5Osg.R_G9bgadRcxJZVOgBl1Fjw +JWT validation succeeded! {"iss":"sender","aud":"receiver","exp":1741342044,"jti":"SwJqXl8BA--9oaVGLstVGw","iat":1741341444,"nbf":1741341324,"sub":"subject","email":"mail@example.com","groups":["group-1","other-group","group-3"],"address":{"street_address":"123 Main St","locality":"Anytown","region":"Anystate","country":"US"}} +[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.413 s - in org.jose4j.examples.ExamplesTest +[INFO] Running org.jose4j.jwt.JwtClaimsTest +[INFO] Tests run: 38, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.094 s - in org.jose4j.jwt.JwtClaimsTest +[INFO] Running org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest +09:57:24.410 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): JsonWebSignature{"alg":"RS256","kid":"76fd32aec7e0f8c190dda8b9dd85e7cf5ad33c43"}->eyJhbGciOiJSUzI1NiIsImtpZCI6Ijc2ZmQzMmFlYzdlMGY4YzE5MGRkYThiOWRkODVlN2NmNWFkMzNjNDMifQ.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_aWQ9QUl0T2F3bGIxSEhFZFJJZW00d2Z1MXFNY1BUdWZvUDZzTi11ZVVrIiwiaWF0IjoxNDMxNjEyMjM4LCJleHAiOjE0MzE2MTU4Mzh9.RRMVpR9WJrkddegS4uKNT7rTov-LvRQ9sCtGo_SXrqkNbLZgArSJcmmHHxoQDsVWUjl2ZNG-7ZjDRuMu-POJLR4GHpwmQ8gttAEeywkiW4in5pUOb21AdgH29HDwG2mY6iVavsASHRutK747gURRlpt3wUJOJk00T9W2N0fVsTE] +[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jwt.consumer.GoogsTooSmallKeyJwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.031 s - in org.jose4j.jwt.consumer.ExamplesFromOpenIdConnectTest +[INFO] Running org.jose4j.jwt.consumer.TypeValidatorTest +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.519 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.520 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.521 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.522 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.522 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.522 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'howaboutno'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.522 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.522 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.522 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.522 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/example+jwt' or just 'example+jwt'. +09:57:24.537 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type 'application/noway)' isn't a valid media type in this context. +09:57:24.537 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/' isn't a valid media type in this context. +09:57:24.537 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '/dpop+jwt' isn't a valid media type in this context. +09:57:24.537 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: The given expected type '' isn't a valid media type in this context. +09:57:24.537 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +09:57:24.537 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +09:57:24.537 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected org.jose4j.lang.UncheckedJoseException: cannot use wildcard in subtype of expected type +09:57:24.538 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.538 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.538 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.538 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.538 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.538 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.551 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.551 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.551 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +09:57:24.551 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +09:57:24.552 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.553 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.554 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.570 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [21] No typ header parameter present in the innermost JWS/JWE +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/nope+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'nonono'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value '*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'application/*+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'jwt+example'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.571 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] Invalid typ header parameter value 'example+jwt'. Expecting 'application/dpop+jwt' or just 'dpop+jwt'. +09:57:24.572 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value '[[meh' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char [ +09:57:24.572 DEBUG o.j.jwt.consumer.TypeValidatorTest - Expected validation error: [22] typ header parameter value 'no;no;no' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: Invalid token char ; +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.052 s - in org.jose4j.jwt.consumer.TypeValidatorTest +[INFO] Running org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest +09:57:24.642 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +09:57:24.659 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=iHQKuSGeWUGYZCg4_RGJSIC0NDQ vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, Zb1HT7ryCRAAj2wcQ8hWbzaqX1s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, W8aO-BD2jx9KMzQjhZ85ukJA5Zg] x5t#S256=qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE].): JsonWebSignature{"x5t#S256":"qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE","x5t":"iHQKuSGeWUGYZCg4_RGJSIC0NDQ","alg":"ES256"}->eyJ4NXQjUzI1NiI6InFTX2JYTlNfSklYQ3JuUmdha2I2b3RFS3Utd0xlb3R6N0tBWjN4UVVPcUUiLCJ4NXQiOiJpSFFLdVNHZVdVR1laQ2c0X1JHSlNJQzBORFEiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTc2MSwic3ViIjoiYWJvdXQifQ.04qPYooLJN2G0q0LYVepaydszTuhY7jKjqi5IGkNBAWZ-IBlW_pWzkurR1MkO48SbJQK2swmy7Ogfihi1ClAlA] +09:57:24.660 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +09:57:24.661 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Neither the x5t header nor the x5t#S256 header are present in the JWS.): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +09:57:24.662 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:24.662 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:24.679 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:24.679 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:24.701 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:24.702 DEBUG o.j.k.r.X509VerificationKeyResolver - Verify signature didn't work: org.jose4j.lang.InvalidKeyException: The given key (algorithm=EC) is not valid for SHA256withRSA; caused by: java.security.InvalidKeyException: No installed provider supports this key: sun.security.ec.ECPublicKeyImpl +09:57:24.716 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +09:57:24.716 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to verify the signature with any of the provided keys - SHA-1 thumbs of provided certificates: [ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y].): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5ODk3OSwic3ViIjoiYWJvdXQifQ.HtKEtmJOb5mmhHni5iJ0FUAEoNStpPZuFmQh7dtw-A7gIYsIUgdLumKCMgjG4OX_hDjvoSGl1XvHwYuzM24AohOJAaSdhLBnxTLZ4NumVwGLWp1uSjSy6stwkZrA3c9qLohLvib3RuX_x20ziOfA6YOMWwaAG66u93VwgG2upXBPwnySUuQYSPbFbSCTacoyJ9jTFu8ggeuI57dH34TyNXJK1F1Kow5IRfsioyVHsT4mP4HRk6xLXOIclf3vsfPoAG9GR8jxpDYxKZXBrDqt8gnKefGcOe6lqQv1zS7Vrb6NO8ejVo5g5tkw5-Kbpu775ShB0-mHrMocrw1n8NmQlA] +09:57:24.746 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +09:57:24.759 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t#S256=FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE vs. SHA-256 thumbs:[CJy-lAE3X0ar44cKrxKcauUHApD_ktFjPC9s6HeOxzU, FSAW7seZg8uiQr91Dc7WGCOV46C-XOZOye8a5gdRNkY, bDSVbp490u3u194xChX6zXb_doBvm1_O1PJM9fxcOiA, qS_bXNS_JIXCrnRgakb6otEKu-wLeotz7KAZ3xQUOqE].): JsonWebSignature{"x5t#S256":"FSqOtB5vPqZ4kjYp09FjBpkmXH0VqEDm-wEcTcox6EE","alg":"ES256"}->eyJ4NXQjUzI1NiI6IkZTcU90QjV2UHFaNGtqWXAwOUZqQnBrbVhIMFZxRURtLXdFY1Rjb3g2RUUiLCJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5OTUzOSwic3ViIjoiYWJvdXQifQ.9Nj3UG8N9u7Eyu0wupR-eVS4Mf0ItwwHBZzwLcY2KUCJeWoPRPT7zC4MqMbHfLj6PzFi09iC3q3PniSJwmWJTA] +09:57:24.774 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +09:57:24.775 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: The X.509 Certificate Thumbprint header(s) in the JWS do not identify any of the provided Certificates - x5t=Zb1HT7ryCRAAj2wcQ8hWbzaqX1s vs. SHA-1 thumbs:[ZzASdwuwMYbEGVd5BPqief91I0s, DkmcQM5AzD8nnQOV5FE_Y1o0l5Y, iHQKuSGeWUGYZCg4_RGJSIC0NDQ, W8aO-BD2jx9KMzQjhZ85ukJA5Zg].): JsonWebSignature{"x5t":"Zb1HT7ryCRAAj2wcQ8hWbzaqX1s","alg":"RS256"}->eyJ4NXQiOiJaYjFIVDdyeUNSQUFqMndjUThoV2J6YXFYMXMiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtZSIsImF1ZCI6InlvdSIsImV4cCI6MTQyMDI5NjI1Nywic3ViIjoiYWJvdXQifQ.RidDM9z0OJkfV2mwxABtEh2Gr_BCFbTuetOTV_dmnFofarBK7VDPPdsdAhtIs3u7WQq9guoo6H3AUGfj4mTFKX3axi2TsaYRKM9wSoRjxFO7ednGcRGx8bnSerqqrbBuM9ZUUt93sIXuneJHYRKlh0Tt9mCXISv1H4OMEueXOJhck-JPgLPfLDqIPa8t93SULKTQtLvs8KEby2uJOL8vIy-a-lFp9irCWwTnd0QRidpuLAPLr428LPNPycEVqD2TpY7y_xaQJh49oqoq_AmQCmIn3CpZLDLqD1wpEPxLQyd1vbvgQ583y2XJ95_QufjbRd2Oshv3Z3JxpIm9Yie6yQ] +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.168 s - in org.jose4j.jwt.consumer.X509VerificationKeyResolverInJwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.JwtConsumerTest +09:57:24.886 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322039,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571322039 -> Oct 17, 2019, 2:20:39?PM GMT} is more than 60 second(s) in the past.] +09:57:24.920 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1570321001,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1570321001 -> Oct 6, 2019, 12:16:41?AM GMT} is more than 60 second(s) in the past.] +09:57:24.946 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":12345,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{12345 -> Jan 1, 1970, 3:25:45?AM GMT} is more than 60 second(s) in the past.] +09:57:24.965 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":0,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} is more than 60 second(s) in the past.] +09:57:24.991 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-938763,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-938763 -> Dec 21, 1969, 3:13:57?AM GMT} is more than 60 second(s) in the past.] +09:57:25.009 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-2147483736,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{-2147483736 -> Dec 13, 1901, 8:44:24?PM GMT} is more than 60 second(s) in the past.] +09:57:25.036 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322101,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322101 -> Oct 17, 2019, 2:21:41?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +09:57:25.063 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322177,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322177 -> Oct 17, 2019, 2:22:57?PM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +09:57:25.080 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":2147483647,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{2147483647 -> Jan 19, 2038, 3:14:07?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +09:57:25.098 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":7700000007,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{7700000007 -> Jan 2, 2214, 8:53:27?AM GMT} is more than 0 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +09:57:25.157 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571321979,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[24] As of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT} iat NumericDate{1571321979 -> Oct 17, 2019, 2:19:39?PM GMT} is more than 120 second(s) in the past.] +09:57:25.212 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":1571322111,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{1571322111 -> Oct 17, 2019, 2:21:51?PM GMT} is more than 10 second(s) ahead of now NumericDate{1571322100 -> Oct 17, 2019, 2:21:40?PM GMT}.] +09:57:25.241 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"issuer.example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (issuer.example.com) doesn't match expected value of nope.example.com] +09:57:25.241 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +09:57:25.242 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "other.one", "meh"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, other.one, meh] - Cannot cast java.util.ArrayList to java.lang.String)] +09:57:25.242 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":["issuer1", "nope.not"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'iss' claim is not the expected type ([issuer1, nope.not] - Cannot cast java.util.ArrayList to java.lang.String)] +09:57:25.242 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https://accounts.google.com"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (https://accounts.google.com) doesn't match expected value of one of [nope.google.com, https://fake.google.com]] +09:57:25.255 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"x"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (x) doesn't match expected value of one of [a, b, c, d, e]] +09:57:25.255 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +09:57:25.255 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +09:57:25.255 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +09:57:25.255 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notiss":"meh"}) rejected due to invalid claims or other invalid content. Additional details: [[11] No Issuer (iss) claim present.] +09:57:25.257 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +09:57:25.257 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +09:57:25.257 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +09:57:25.257 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +09:57:25.257 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +09:57:25.257 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: JWS Plaintext (alg=none) must not use a key.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.] +09:57:25.257 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +09:57:25.257 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJub25lIn0.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ. Additional details: [[10] Missing signature.] +09:57:28.605 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiaXFZS3V6SUJnWlFZMGh2LXZ1MHh1TnN3WUJVdzNVSVR3c0ItUmxRQlZxVSIsInkiOiJPMDdZSHg0VklHNF9WZFotYTJNTy1GdFl0bDdYYWcwNUgyU0JHZlJGZTlZIiwiY3J2IjoiUC0yNTYifX0.fG24Vptj7Mw8MzHArZrhrOdIytSwzFwfizb6angkMAtpiQPnOJX9Hg.oDvXQcOPrmfhc70RYGCuBA.BLJokZbMlRdARqw39U6LcO8lRob_eeDDOrLEIcpx6O6DTlEs2LlushcaiUYZCV6N655I7t_ktVK2dGyPza9hMQ.mFtuL0DZiiLSeJsfprV3lg Additional details: [[20] Missing Integrity Protection] +09:57:28.649 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImtpZCI6ImVjMiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJXWDZ2c214X3hSVG5mWW83WDdtOUMxUk5uakduOC01MlR6UVAyaEdxZF9rIiwieSI6IlBIek0xSkF1ejJ4VmFYNEF0SFhhb3hEZ3dRV1liVlJUdWhYM0lHcFBEQjAiLCJjcnYiOiJQLTI1NiJ9fQ..ZybGWJtJlnumnKtdz9195Q.-hs_eLFC6UEUvxjzKzOP2jHawpPYxwDSKCRPpqJnO-Eg-pXJfGe1aO2EWh-2io8xALP0j8pX4VL8OKTcH5j6qw.k76FnlnTDaawQ0QK1565Yg Additional details: [[20] Missing Integrity Protection] +09:57:28.689 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiS1diYzItY3NsZmtJOGloWDNKT1JzR29EWUdxd1JXSEY3cm5DUldGNkpCbyIsInkiOiJPbGtCX1k5elZidEVFYS1tV1VoTEVxRU9uVFU0OU9xQllqZl9rYk9BWExZIiwiY3J2IjoiUC0yNTYifX0.3fNdgk7YGsNzY332yWjxFddFBNdECQDCnNu4auycDvZ2puHU5bpb1VBOvaJPE88yVQCf8GCyC0iYwmeLBWepeoxEeS5vAuG4.TiW60ozn1Nbf2F-x_4YGmA.MwCat5-U-VBBTAukbHJC0pMgio195W9ewJrlHyk2DbOljtV8EedBP5El06SrKtN0blHs6D7iPNtCep1Wxj23Qw.HIJsOES_KGDrh6Ws-irOwEaMy-cDTFTXvhTCjMsvl5I Additional details: [[20] Missing Integrity Protection] +09:57:28.733 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJlYzIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiYnY3TVNYQ1l1ZU5LZVp4dThBbERWeWZia0NRakNfYkNBTGRkLUxleHpLOCIsInkiOiJRYWF0dGVVLWk0aEt4NlNELXo0V1NyREtWM2o3WHlZSEd4UjkwMkx1YU1RIiwiY3J2IjoiUC0yNTYifX0.-hz3CRq4rFgUn6U2kGaLa6yeYjLClZ2jonUQht8oqnWWWHbfVvGnEyjiltrtDKvZ8zI7wYEJcAY.SXvhfBmbHrZLQH7fINmYWQ.YfPz9ubKVuBRhJROR6OigLAXvawKlk8CSldYbQ8-sfBEfkAjK1Rx13u4E6y9Vjj1rAP-a7hs1nHnOk6rsiWJFw.QTorP6yys6i4lszStBnhXfCguRd0Sx0B Additional details: [[20] Missing Integrity Protection] +09:57:28.781 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJyMi1iIn0.SuI2QLDa9pwyTMdtjM9r9-X6u7duwIzdDVmKgwS5Lxutp92VvcASTPdjIpRzvKjhs3Qqr4FR-ndX_i40hypvPmkE_af9gEeXbC_TZoLOiS0c38SwexBXLbMtJ6jVRzqE3gypiihIMTzwz5aiG-oDPT_kRPgmsDTGOXwdUB2qtASNSgRifHbvp56XanHkNjt3FM1Y_JtBsHGn4jbuEq9atMdwpluJ7CHoFttdfdhg2BieYI-NqGUvKl-sX54lyWdqP0CakxjTp2rxvdJ5exy6FgJLu1_6TmGC9S3-Ce22zE9JiNhqeZ-mHkb0cGdEEgyt7ISjAu4MvuMkSLc4QopS_w.wDRcS_L4uT3iASwihYRYew.e1Eu8Vryy3yFdyMbdwO4AfvzoJVjByb9csrXm5M1gdM9eMo5P1xZId51egcHqZOK_AgthYX1JyR7wxQ877r_HQ.GsPpf8Lozf4yu5e-oneL_g Additional details: [[20] Missing Integrity Protection] +09:57:28.798 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJraWQiOiJyMi1iIn0.YHSKA2QCo8oUL1tdv9CAl3V7mrVL6obm2BJeJNOHM9onK-i8ArG1kvtcwHomUOWjCqpEB-vcx2YBr23zhDLBgnru_6wSz0lq6yNUzW4FZcU5Wsf0JMBQDnPRf2Hp0WSTF90JngNwDOdXOZKgj63xgRjfF3eQQNETfIX1w44_kuyKyrTlpcOv4YQrLrOSVi9spaXu08UjtqSMpCFKeWHkP1rdvGTHjsmvh9BWSV8rtTkSo50PUsMeH_EGZPqZgiPEcb7NNimTk5WGMCryyjaSgUKpzNvIZ8wurjQW5Q3OR3ULsD5tbBPE8Z53AOOXe_pNGOCO3iUxH_uR7GVvbvnglw.THSZOQP5-DDrNy1zcvM57w.ZzrHRFij8LsWEucssIHhr-TuN63mND-ZzSBlDIklL330KVHZdBu8ICiVT12JSuUShldvRxlbMCzy78vKVcmJ-g.cdIZzY-NGJ174LkNzJhkeuupqM0N1phI Additional details: [[20] Missing Integrity Protection] +09:57:28.824 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJraWQiOiJyMi1iIn0.r9iAe12cPiH-53yLvOb2zoxR8sWuuUUISfZKWzqcBVXasg2rgTaD56Kwknd9UAs0zsTB2-GP6MMwlM-AVlqFGj7mArjcKjdWQ-Skm3M8lcsYo4LvYUCC7SD7Cbo38vbqS2Pc60BWgcNV2F5AOCzlBVd9MweFYuSAXZDF1ikyooLDn20cfuqfE_aopd6WtO9tdcujsTdLyP3Nryv5sadBQlRiKIZ5yOtjetxoXERdIpEGCg971SULg5zshfgmxIOoiPhbXA8gWPOtSxIvRY4g1io2FsmsPUyxDuiSMO3TOGbs75ziRtWfIoPqotAnqssajii0s9gjVdqFyA1LLQxdkA.DwipK1oiv-2ED2tkd-WR8w.eGWV05lFYbTWv4k4GQL85hIyJfKyp4RGxbcH40ald15ddLDWfnH_bKMhRGx4wNW694xywSN8Lbk3iOMsPub1XQ.jGcwhs5Xnr3VoKKNh6h6Crofym4uwNVE4bBYE_hAV9I Additional details: [[20] Missing Integrity Protection] +09:57:28.825 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS256","kid":"r2"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec5, x=AO9H36XHmNXaRiLgK-0iyeb8GCTjzoer2ldRUU4La-W6TA9H3ww1vAMyoCOrvNmcGdA4_31zw-fY6OXH9ijteq-m, y=Ac0YwHOhSMzv311E3c0VpEw22zOb0OWmJuJitrTNBcR3LSlYEmskCgH0PgdVOAS4bJMZPj1ZJ6Y2EKLE1iyzTiKy, crv=P-521}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=512bits}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec2, x=BaHTYSnKpCkgFrZof5YBEyCdlZZ2dbFmT8iVCIZxf7M, y=ulRK0VQJbIMuSPSDNdHfrWAiYA_ejBWmZrqoySH8Hjc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, n=-dtAPBIqWQ5MON8YhZ3HILDkVLJckmCmlygcTCXpBuWVRL2kswAs-qWMEWuwm6_a6z639USrJL2wQK2au4oeDnLl3ojcY5ml0_HLA5OA0BbhOuu66l6RNSwLWNZm1XeG4WFaiFnmatB8ybAFCZxMecWRwiUq5yLhbGvZzMZH-4tePvFn2fxewbngcrEtRkQCvFll-i03pifEDojlnpRS9Uc5HohO1nWJcE8F59msF1KwC6t01IEnjO7kdDHiLsHcVBDeYHJ4AqczWJ74M-Yl8rj3sITnO-mWNZ3tGmBG21Ee5NnN8RyRW1Loe8vY2WKVCLjVoM89V_NuGwoaupauLQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=ec3, x=6BBO06rKHuYDSt3AZSYmO2ZgUGnydOClPAGGosmv73VRw98diQWL3MHmjMLvP3UA, y=eiQkCa3oqlIQH3sWFhWmZZdDMq3L2E2i1yKyjNUtnzoT9kK02YKtmyfFRWAhX7GA, crv=P-384}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=128bits}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2-b, n=18w3R8Ofvzk3VtSCQBuoCOfG6GMe4GRNcnJFua52GDlQxe9aRUBDE50PsCldg8UaInPzvBZxBoYm6rVbTJ9uDCcEtWaT8AM5IXc0NgJQWcXKQ5pRXu4GglohJIJ1JPTHrEEWmQ59llnrK_oOLLov7awo0ZU1tWVM5YB8SCJOXSYHndv6JXmFpoSCwMlHfTY-xzer2aDUz-GBN7ZVTnNnSCyc1-2XCtUk5eRGVXOhHolTThxue1VUI10fX8uxXzQpad16ZMgdOOY3-SVKD4HyhrvthVwttRS4FIYGX4IwYpaogIql66V_lxQlaOt6pp62gUxen9VH80ufRjOq50cDEw, e=AQAB}]): JsonWebSignature{"alg":"HS256","kid":"r2"}->eyJhbGciOiJIUzI1NiIsImtpZCI6InIyIn0.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTc0MTM0MjA0OCwic3ViIjoicyJ9.bI9Qjrk3J4FYMPyqOXs8K3_gaIaSOFQEfmdfc5aVx3M] +09:57:28.826 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.FHkMcj14gVUXLDUBtEl3HJpD8GzVNnqzoSpCkjsoWS0BG4MaGxI9xYZ1BFAMQnKTl0Z2YRV2RO_UqcfzwzLcE1NR1drXvjp4fhQVuHS5_XTL4CtEoXKt1K6MM2xRZcbRNSjIQM9QVVpWk6YqiMgA7pKlOjNdm5Hw2sVGpuhLhvFGglDgmGRA4pifxGoFMUMegGZIgqFMcp9Px8sUAk1J5zY31qEhD_ngYDEiiz7_vTdEhfobNuJDDfEoBesEUxr4NzlpvuRvZN0NfBlm1Vq6eYjBHdN1tucc8sGoNKzdXs-Kj2pfSvt0dho8a3-TNTQsxC6vROSy4y02fivQyIsaog.dNNlzDYvKeNMxwADxZNlYw.r-jmSVmv9H42g6Y3ktkzIBhjtsEY1q-zds9sLgOV2qd-3P-mIqKpZ4bC8sTQ1W2oOIPQUASGqFov4fRKEqn76Q.mljqqvbC-33dkUcXhvmwCw] +09:57:28.851 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoicjItYiJ9.FHkMcj14gVUXLDUBtEl3HJpD8GzVNnqzoSpCkjsoWS0BG4MaGxI9xYZ1BFAMQnKTl0Z2YRV2RO_UqcfzwzLcE1NR1drXvjp4fhQVuHS5_XTL4CtEoXKt1K6MM2xRZcbRNSjIQM9QVVpWk6YqiMgA7pKlOjNdm5Hw2sVGpuhLhvFGglDgmGRA4pifxGoFMUMegGZIgqFMcp9Px8sUAk1J5zY31qEhD_ngYDEiiz7_vTdEhfobNuJDDfEoBesEUxr4NzlpvuRvZN0NfBlm1Vq6eYjBHdN1tucc8sGoNKzdXs-Kj2pfSvt0dho8a3-TNTQsxC6vROSy4y02fivQyIsaog.dNNlzDYvKeNMxwADxZNlYw.r-jmSVmv9H42g6Y3ktkzIBhjtsEY1q-zds9sLgOV2qd-3P-mIqKpZ4bC8sTQ1W2oOIPQUASGqFov4fRKEqn76Q.mljqqvbC-33dkUcXhvmwCw Additional details: [[20] Missing Integrity Protection] +09:57:28.884 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +09:57:28.884 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no encryption but the JWT Consumer is configured to require it: eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk Additional details: [[19] No encryption.] +09:57:28.885 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +09:57:28.885 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +09:57:28.885 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"example.com"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com] doesn't contain an acceptable identifier. Expected one of [example.org, nada, nope] as an aud value.] +09:57:28.885 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +09:57:28.885 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject"}) rejected due to invalid claims or other invalid content. Additional details: [[7] No Audience (aud) claim present.] +09:57:28.885 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected example.org as an aud value.] +09:57:28.885 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", "usa.org", "ca.ca"]}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [example.com, usa.org, ca.ca] doesn't contain an acceptable identifier. Expected one of [example.org, some.other.junk] as an aud value.] +09:57:28.886 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":["example.com", 47, false]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The array value of the 'aud' claim contains non string values (47 - class java.lang.Long cannot be cast to class java.lang.String (java.lang.Long and java.lang.String are in module java.base of loader 'bootstrap'))] +09:57:28.886 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":20475}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +09:57:28.899 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":{"aud":"example.org"}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'aud' claim is not an array of strings or a single string value.] +09:57:28.915 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] +09:57:28.915 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.JwtConsumerTest$4: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:919); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$4.validate(JwtConsumerTest.java:913); ...omitted...] +09:57:28.916 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"name":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[14] No Subject (sub) claim is present.] +09:57:28.916 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":724729}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type (724729 - Cannot cast java.lang.Long to java.lang.String)] +09:57:28.916 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":{"values":["one", "2"]}}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'sub' claim is not the expected type ({values=[one, 2]} - Cannot cast org.jose4j.json.JsonUtil$DupeKeyDisallowingLinkedHashMap to java.lang.String)] +09:57:28.946 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJraWQiOiJhY2MiLCJjdHkiOiJKV1QifQ.KrukndaF2sHb3Y0r311rrYmCrXco-99ZIQ3iLjvCVbbow5MppRTK4DPJUShcndfcIVIFXMYSLGvIJwf39yZRJJ_EvBFnqhOUeCAsUHLGO1yxoQ619jmSh4bCaIicLYeivKaVSQN4Ezc5fvg-Nnv6TBIIgHuWMDU2Ztd96DJRokc.wMg2Eb8izCOUnACqdrcPQA.quFKSN7xQoMJzaYFBVwykQZ8zB3hpW8HtK7pm-4Ggzorno_K-eBQ7fXjRmJ1Jw-kCcmUa8flpnQqpL9jurtlz7DC1ABe0vm2ZkHoJluB6QeSr60Y9rP7kyy_rd3blXT_7t6Wgowo8MumXrrUUxxEQJgXvCmKbd-Rw9sK5jAHEug3zztLXHOX0O0QoxDzTJOsSRtodsu7bTJa-ADvPmK9e0Xp06NRqvx7WuJGKlq3cwQ.DL6yaCdiOUcViN-eZVIwOA] +09:57:29.235 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1741341389,"sub":"s","nbf":1741341269}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1741341449 -> Mar 7, 2025, 9:57:29?AM GMT} is on or after the Expiration Time (exp=NumericDate{1741341389 -> Mar 7, 2025, 9:56:29?AM GMT}) claim value.] +09:57:29.237 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1741341389,"sub":"s"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1741341449 -> Mar 7, 2025, 9:57:29?AM GMT} is on or after the Expiration Time (exp=NumericDate{1741341389 -> Mar 7, 2025, 9:56:29?AM GMT}) claim value.] +09:57:29.238 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1741342649,"sub":"s","nbf":1741341689}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1741341449 -> Mar 7, 2025, 9:57:29?AM GMT} is before the Not Before (nbf=NumericDate{1741341689 -> Mar 7, 2025, 10:01:29?AM GMT}) claim time.] +09:57:29.247 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidKeyException: A key of the same size as the hash output (i.e. 256 bits for HS256) or larger MUST be used with the HMAC SHA algorithms but this key is only 128 bits): JsonWebSignature{"kid":"esc","alg":"HS256"}->eyJraWQiOiJlc2MiLCJhbGciOiJIUzI1NiJ9.eyJhdWQiOiJhIiwiaXNzIjoiaSIsImV4cCI6MTQzMjMyNTQ5Niwic3ViIjoicyIsIm5iZiI6MTQzMjMyNDgzNn0.16LpzAZyBcokZ4aUaXHn5yN0xQ1zpmLyJVFHu6nH1zY] +09:57:29.265 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 9223372036854775808 is unreasonable for a NumericDate] +09:57:29.291 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":25113002000004770000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] 25113002000004770000 is unreasonable for a NumericDate] +09:57:29.308 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775809,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -9223372036854775809 is unreasonable for a NumericDate] +09:57:29.333 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-77261600013501300000000,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[18] -77261600013501300000000 is unreasonable for a NumericDate] +09:57:29.355 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 2147483647 second(s) ahead of now NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT}.] +09:57:29.384 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775 = 9214148664817921033 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +09:57:29.427 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +09:57:29.461 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 9223372036854775807 = 1 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +09:57:29.487 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[23] iat NumericDate{9223372036854775807} is more than 10 second(s) ahead of now NumericDate{0 -> Jan 1, 1970, 12:00:00?AM GMT} (even when providing 2147483647 seconds of leeway to account for clock skew).] +09:57:29.504 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iat":-9223372036854775808,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775808 - 2147483647 = 9223372034707292161 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:152); ...omitted...] +09:57:29.827 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +09:57:29.827 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[-76717] You can go blind issuing tokens to yourself...] +09:57:29.876 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1741341389,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1741341449 -> Mar 7, 2025, 9:57:29?AM GMT} is on or after the Expiration Time (exp=NumericDate{1741341389 -> Mar 7, 2025, 9:56:29?AM GMT}) claim value.] +09:57:29.908 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[15] Subject (sub) claim value (d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea) doesn't match expected value of NOOOOOOOOOOOOOOOOPE] +09:57:29.909 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value.] +09:57:29.910 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"https:\/\/connect.openid4.us:5443\/phpOp","sub":"d4c1139175052dd515fa9358a5c2d4b4a4ada36d815bb8789a041a41ffffdcea","aud":["R-RufjSDVGCGfdTmIobf2Q"],"exp":1428446905,"iat":1428446605,"nonce":"PuzxJIkqv6zr","auth_time":1428445010}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [R-RufjSDVGCGfdTmIobf2Q] doesn't contain an acceptable identifier. Expected one of [no, nope, no way jose] as an aud value.] +09:57:29.923 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject", "iss":"issuer", "aud":"audience"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [audience] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (issuer) doesn't match expected value of no way, [13] The JWT ID (jti) claim is not present.] +09:57:29.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1741342049,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value.] +09:57:29.964 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1741342049,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[12] Issuer (iss) claim value (ISS) doesn't match expected value of no way] +09:57:29.966 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1741342049,"iss":"ISS","aud":"AUD","sub":"SUB"}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [AUD] doesn't contain an acceptable identifier. Expected nope as an aud value., [12] Issuer (iss) claim value (ISS) doesn't match expected value of no way, [5] The Expiration Time (exp=NumericDate{1741342049 -> Mar 7, 2025, 10:07:29?AM GMT}) claim value cannot be more than 5 minutes in the future relative to the evaluation time NumericDate{1741341449 -> Mar 7, 2025, 9:57:29?AM GMT}.] +09:57:29.980 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJleHAiOjE3NDEzNDIwNDksImlzcyI6IklTUyIsImF1ZCI6IkFVRCIsInN1YiI6IlNVQiJ9.NGns23fwIfHwxj0tDsFcFuzrlZYopHMWm5gaUzZyNdAwfLU3n_idriThNBjcA2Y68-3cw6IJs9sGmPlNVmXOtEG5n5DrjjmMLCpoeBvLmKW_sCPM35Dx62ZCoi4_QlfZvOVoSfzR9i7_9QwAmpRiPYBFLC3SVH2exH3Cr3FKIKqADeOf3yo86w22JaftSRcpA0I1wVOGvCvrw2EfO1nFuhl5g7Wp1Jl1aRnmYPo9v656Dq_zfmdNY8W9yGeuNXnpPTx4gXeQ2GbXS95vBzansM769TPtNaEC_kaQxzYMdPmc1MkAwqFcw6RQ6Qfv4JUwKs19XGwAuWLN8vT6djTODw] +09:57:30.021 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.XvyfyUGp74ZYHYXEKltMygiUDDi0SUEzTN5sUJGcg166FM05rVMxXpUFc48-o72323k80A5jjaVw5wyP1llPGuxWKw4nR-nvupQU8zqiv7L741_Dg9MxwKqZuLBK-1XJsQ5aq-fCOrywmZZKdLdzSsWEiXT_GWuH8koWWTCodCR9HNK7HmzQJqT7gBIzLTiQscdmG5f1MdcGngbC46_eCvEKMsJv-CSlYc9yc0oDkEZ4BBz6t1nZ01i6RBm5pNn8U6GQaefln2qHFCTOCdSAN2IZjc0Eux6WHQDFmkrKiizD-ID6DCcJVvw9lRWgZTXg4-LEmP6bp2FuJx4KpGPJSg.Tkgf48tRgd9vjfdKxzviHg.zYGnF9jy4iMKUipV5eL2Wt7WqilvNBdGf4auxKkxNm196iPkSjDDjyiMtKDSQbq4phyd0w3_6CfDKg7W42dR2A.0ddQgjknIqE0G5bwtEzmfw Additional details: [[10] Missing signature.] +09:57:30.041 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +09:57:30.041 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","aud":"same","exp":1420046060}) rejected due to invalid claims or other invalid content. Additional details: [[17] You can go blind issuing tokens to yourself...] +09:57:30.079 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1239223372036854775808,"iat":1571322100,"exp":9223372036854775807,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] -1239223372036854775808 is unreasonable for a NumericDate] +09:57:30.096 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":12345678900000000000,"exp":12345678900000000009,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 12345678900000000009 is unreasonable for a NumericDate] +09:57:30.113 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":1571322100,"iat":1571322111,"exp":157132210009188371766311111,"jti":"meh123"}) rejected due to invalid claims or other invalid content. Additional details: [[18] 157132210009188371766311111 is unreasonable for a NumericDate] +09:57:30.130 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{9223372036854775807}) claim value cannot be more than 2147483647 minutes in the future relative to the evaluation time NumericDate{9223371903710789693} (even when providing 2147483647 seconds of leeway to account for clock skew).] +09:57:30.156 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"nbf":-1,"exp":9223372036854775802,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow adding: 9223372036854775792 + 30 = -9223372036854775794 at org.jose4j.lang.Maths.add(Maths.java:13); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:143); ...omitted...] +09:57:30.173 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":1572322100,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854774808 - 6000 = 9223372036854770808 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:113); ...omitted...] +09:57:30.199 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":-9223372036854775798,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: -9223372036854775798 - 65 = 9223372036854775753 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +09:57:30.216 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"exp":9223372036854775807,"jti":"meh123","etc.":"etc., etc., etc..."}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.NumericDateValidator: java.lang.ArithmeticException: long overflow subtracting: 9223372036854775807 - -10 = -9223372036854775799 at org.jose4j.lang.Maths.subtract(Maths.java:24); org.jose4j.jwt.consumer.NumericDateValidator.validate(NumericDateValidator.java:131); ...omitted...] +09:57:30.218 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.eyJpc3MiOiJtZSIsImF1ZCI6Im1lIiwiZXhwIjoxNDIwMjMxNjA2LCJuYW1lIjoidmFsdWUifQ.QsGX3JhHP1Pwy4zQ8Ha9FQ] +09:57:30.230 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=QsGX3JhHP1Pwy4zQ8Ha9FQ): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..zWNzKpA-QA0BboVl02nz-A.u1D7JCpDFeRl69G1L-h3IRrmcOXiWLnhr23ugO2kkDqKVNcO1YQ4Xvl9Sag4aYOnkqUbqe6Wdz8KK3d9q178tA.QsGX3JhHP1Pwy4zQ8Ha9FQ] +09:57:30.262 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +09:57:30.262 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +09:57:30.275 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidKeyException: Key cannot be null): JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +09:57:30.275 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'RSA1_5' is a blocked algorithm.): eyJhbGciOiJSU0ExXzUiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.g_hEwksO1Ax8Qn7HoN-BVeBoa8FXe0kpyk_XdcSmxvcM5_P296JXXtoHISr_DD_MqewaQSH4dZOQHoUgKLeFly-9RI11TG-_Ge1bZFazBPwKC5lJ6OLANLMd0QSL4fYEb9ERe-epKYE3xb2jfY1AltHqBO-PM6j23Guj2yDKnFv6WO72tteVzm_2n17SBFvhDuR9a2nHTE67pe0XGBUS_TK7ecA-iVq5COeVdJR4U4VZGGlxRGPLRHvolVLEHx6DYyLpw30Ay9R6d68YCLi9FYTq3hIXPK_-dmPlOUlKvPr1GgJzRoeC9G5qCvdcHWsqJGTO_z3Wfo5zsqwkxruxwA.UmVkbW9uZCBXQSA5ODA1Mg.VwHERHPvCNcHHpTjkoigx3_ExK0Qc71RMEParpatm0X_qpg-w8kozSjfNIPPXiTBBLXR65CIPkFqz4l1Ae9w_uowKiwyi9acgVztAi-pSL8GQSXnaamh9kX1mdh3M_TT-FZGQFQsFhu0Z72gJKGdfGE-OE7hS1zuBD5oEUfk0Dmb0VzWEzpxxiSSBbBAzP10l56pPfAtrjEYw-7ygeMkwBl6Z_mLS6w6xUgKlvW6ULmkV-uLC4FUiyKECK4e3WZYKw1bpgIqGYsw2v_grHjszJZ-_I5uM-9RA8ycX9KqPRp9gc6pXmoU_-27ATs9XCvrZXUtK2902AUzqpeEUJYjWWxSNsS-r1TJ1I-FMJ4XyAiGrfmo9hQPcNBYxPz3GQb28Y5CLSQfNgKSGt0A4isp1hBUXBHAndgtcslt7ZoQJaKe_nNJgNliWtWpJ_ebuOpEl8jdhehdccnRMIwAmU1n7SPkmhIl1HlSOpvcvDfhUN5wuqU955vOBvfkBOh5A11UzBuo2WlgZ6hYi9-e3w29bR0C2-pp3jbqxEDw3iWaf2dc5b-LnR0FEYXvI_tYk5rd_J9N0mg0tQ6RbpxNEMNoA9QWk5lgdPvbh9BaO195abQ.AVO9iT5AV4CzvDJCdhSFlQ] +09:57:30.276 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.cC4hiUPoj9Eetdgtv3hF80EGrhuB__dzERat0XF9g2VtQgr9PJbu3XOiZj5RZmh7AAuHIm4Bh-0Qc_lF5YKt_O8W2Fp5jujGbds9uJdbF9CUAr7t1dnZcAcQjbKBYNX4BAynRFdiuB--f_nZLgrnbyTyWzO75vRK5h6xBArLIARNPvkSjtQBMHlb1L07Qe7K0GarZRmB_eSN9383LcOLn6_dO--xi12jzDwusC-eOkHWEsqtFZESc6BfI7noOPqvhJ1phCnvWh6IeYI2w9QOYEUipUTI8np6LbgGY9Fs98rqVt5AXLIhWkWywlVmtVrBp0igcN_IoypGlUPQGe77Rw] +09:57:30.277 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"129ffs904","iss":"I?m sorry, this is our family?s first kidnapping.","aud":"ap.io/","exp":1702498218}] +09:57:30.277 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"jwt"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"1234","iss":"abcd","aud":"https://example.com/as","iat":1702497918,"exp":1702498218}] +09:57:30.277 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"0","iss":"ctyortyp","aud":"audiencia","exp":1702498218}] +09:57:30.277 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JWT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"2","iss":"ctyortyp","aud":"to.whom.it.may.concern","exp":1702499888}] +09:57:30.278 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested (outer object header {"alg":"HS256","cty":"JwT"}) JOSE object (cause: org.jose4j.lang.JoseException: The JOSE Compact Serialization is period delimited series of base64url-encoded values, which cannot start with "{"): {"sub":"42","iss":"ctyortyp","aud":"to.whom.it.may.concern...","exp":1702599888}] +JWT Claims Set:{exp=1741341750, sub=subject, iss=issuer} +09:57:30.294 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[2] No Expiration Time (exp) claim present.] +09:57:30.294 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[3] No Issued At (iat) claim present.] +09:57:30.294 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell"}) rejected due to invalid claims or other invalid content. Additional details: [[4] No Not Before (nbf) claim present.] +09:57:30.308 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +09:57:30.309 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +09:57:30.309 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 1 seconds of leeway to account for clock skew).] +09:57:30.310 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602002 -> May 2, 2015, 9:26:42?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 2 seconds of leeway to account for clock skew).] +09:57:30.323 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value.] +09:57:30.324 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[1] The JWT is no longer valid - the evaluation time NumericDate{1430602065 -> May 2, 2015, 9:27:45?PM GMT} is on or after the Expiration Time (exp=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim value (even when providing 60 seconds of leeway to account for clock skew).] +09:57:30.325 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000}) rejected due to invalid claims or other invalid content. Additional details: [[6] The JWT is not yet valid as the evaluation time NumericDate{1430601999 -> May 2, 2015, 9:26:39?PM GMT} is before the Not Before (nbf=NumericDate{1430602000 -> May 2, 2015, 9:26:40?PM GMT}) claim time.] +09:57:30.325 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430603000, "iat":1430602060, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Not Before (nbf=NumericDate{1430603000 -> May 2, 2015, 9:43:20?PM GMT}) claim value.] +09:57:30.326 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "nbf":1430602000, "iat":1430602660, "exp":1430602600 }) rejected due to invalid claims or other invalid content. Additional details: [[17] The Expiration Time (exp=NumericDate{1430602600 -> May 2, 2015, 9:36:40?PM GMT}) claim value cannot be before the Issued At (iat=NumericDate{1430602660 -> May 2, 2015, 9:37:40?PM GMT}) claim value.] +09:57:30.340 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 90 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] +09:57:30.341 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"brian.d.campbell", "exp":1430607201}) rejected due to invalid claims or other invalid content. Additional details: [[5] The Expiration Time (exp=NumericDate{1430607201 -> May 2, 2015, 10:53:21?PM GMT}) claim value cannot be more than 120 minutes in the future relative to the evaluation time NumericDate{1430600000 -> May 2, 2015, 8:53:20?PM GMT}.] +09:57:30.357 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: This VerificationKeyResolver always throws this exception.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc0MTM0MTc1MCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +09:57:30.357 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'none' is a blocked algorithm.): JsonWebSignature{"alg":"none"}->eyJhbGciOiJub25lIn0.eyJzdWIiOiJtZSIsImV4cCI6MTc0MTM0MTc1MCwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.] +09:57:30.513 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +09:57:30.514 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Can't do it!): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +09:57:30.514 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +09:57:30.531 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unexpected exception encountered while processing JOSE object (java.lang.IllegalArgumentException: Stuff happens...): JsonWebSignature{"typ":"JWT", + "alg":"HS256"}->eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJqb2UiLA0KICJleHAiOjEzMDA4MTkzODAsDQogImh0dHA6Ly9leGFtcGxlLmNvbS9pc19yb290Ijp0cnVlfQ.dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk] +09:57:30.541 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +09:57:30.542 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"iss":"same","exp":1420046814}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter: java.lang.RuntimeException: Something bad happened. at org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:862); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...; caused by: java.util.NoSuchElementException at java.base/java.util.Collections$EmptyIterator.next(Collections.java:4531); org.jose4j.jwt.consumer.JwtConsumerTest$3.validate(JwtConsumerTest.java:856); org.jose4j.jwt.consumer.ErrorCodeValidatorAdapter.validate(ErrorCodeValidatorAdapter.java:35); ...omitted...] +09:57:30.558 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +09:57:30.558 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no signature but the JWT Consumer is configured to require one: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[10] Missing signature.] +09:57:30.570 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +09:57:30.571 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: The JWT has no integrity protection (signature/MAC or symmetric AEAD encryption) but the JWT Consumer is configured to require it: eyJ6aXAiOiJERUYiLCJhbGciOiJFQ0RILUVTIiwiZW5jIjoiQTEyOENCQy1IUzI1NiIsImVwayI6eyJrdHkiOiJFQyIsIngiOiJ3UXdIa1RUci1tUFpaZURDYU8wRjEwNi1NTkg0aFBfX0xrTW5MaElkTVhVIiwieSI6IkF4Ul9VNW1EN1FhMnFia3R5WS0tU1dsMng0N1gxTWJ5S2Rxb1JteUFVS1UiLCJjcnYiOiJQLTI1NiJ9fQ..oeYI_sIoU1LWIUw3z16V_g.J_BlS-qDJnAqw9wzngIQQioTbTGbyFnorVRq1WTO3leFXKKuBmqoWPHqoVSZdzsVeiFkI-F1DesY489MltwGYg.egjQH2w4oHpMgfjg8saXxQ Additional details: [[20] Missing Integrity Protection] +09:57:30.598 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +09:57:30.598 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +09:57:30.600 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +09:57:30.601 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +09:57:30.601 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +09:57:30.601 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +09:57:30.601 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +09:57:30.601 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128KW' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +09:57:30.601 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +09:57:30.601 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +09:57:30.602 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +09:57:30.602 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'A128CBC-HS256' is a blocked algorithm.): JsonWebEncryption{"zip":"DEF","alg":"A128KW","enc":"A128CBC-HS256","cty":"JWT"}->eyJ6aXAiOiJERUYiLCJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.DDyrirrztC88OaDtTkkNgNIyZqQd4gjWrab9KkiBnyOULjWZWt-IAg.Obun_t7l3FYqNUqyW46syg.ChlzoLTN1ovJP9PLHlirc-_yvP4ya_5gdhDSKiZnifS9MjCbeMYebkOCxSHexs09PBbPv30JwtIyM7caqkSNggA8HT_ub1moMpx0uOFhTE9dpdY4Wb4Ym6mqtIQhdwLymDVCI6vRn-NH88vdLluGSYYLhelgcL05qeWJQKzV3mxopgM-Q7N7LycXrodqTdvM.ay9pwehz96tJgRKvSwASDg] +09:57:30.603 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +09:57:30.606 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process nested JOSE object (cause: org.jose4j.lang.InvalidAlgorithmException: 'HS256' is a blocked algorithm.): JsonWebSignature{"alg":"HS256"}->eyJhbGciOiJIUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MTk5ODIwODQsIm1lc3NhZ2UiOiJlaCJ9.Y9spJMM4tJGh7fpAPFymGASoOfbmm_0tOjndPzz0y-c] +09:57:30.621 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: Unable to parse what was expected to be the JWT Claim Set JSON: "eyJhbGciOiJFUzI1NiJ9.eyJpc3MiOiJ1c2EiLCJhdWQiOiJjYW5hZGEiLCJleHAiOjE0MjAyMTkwOTcsIm1lc3NhZ2UiOiJlaCJ9.ADXjpouiqbRqymN-NJ84HjU0ZZUmAajlb43Vzb6yTolFU9dTAcL6XhBAy5cwlPaS_3VT4Ce2CMpgruihmaftHA" Additional details: [[16] Invalid JSON.] +JWT Claims Set:{sub=me, aud=a, iss=i, exp=1741342050} +eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.VyuFTTZ8YlB2eDcfgsxB87B1qkA7X-ibhv83hE7fk1S0z-vz6_jjMSCjPwWsbjxQwmEQwYJJUSyVQ8aajzmmyQbCasUhRitkb0X1ncnzVumz37FUA8XhJKUgu63Bxfvrt8zuHr2LACnGuAJWq2yjkwIZvnfM2OfHOvq24Q2ClQh8JaQOu2dRb6tow86E1XilpUsvj37vsr0y0e68ev6qjpp4Jzsbp8nlRp0Q47JXtVKZCSffgHszLqo-GgGP7DusgSKmQrF97_Albwv9R0Xq7Ese6Ztr4S_mumOOw_qPHMlK3LagxZKBVXJRuu8EQfxbYyr_cdRJ6j-AZMF2Xn34-Q.7k_5DfvgJAVGBUJHnPSUog.RWasAO9GwRHZxhWN-xxU_jqM3eTNIyjqzwGAmpTZBGpimy0L3BE_aQqdkfRO43LazU4wXHy9P9i4lruYp6KwLA91Beso9V6EBvBSWWbmnYoHLApweH1beQ3Sp5E02p2z_BINVk7u0LAkYR1WmU1yB3YxcYObTkGlfb0-P4CKKGUm1bYN6G1WZgYAf7XMTxydJ11BwakjtPymRpn3Ily-LgUX1_xpYDYEtSdiU0PtkP3mV6vrFl_8j03jRmud-O5JiaR0VeCqXTso1fugPb8hOw.A-Y7Vbmqdj_IrJDFSYVYyw +09:57:30.638 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.JoseException: Unrecognized header 'fake.blah' marked as critical.): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJjdHkiOiJqd3QiLCJjcml0IjpbImZha2UuYmxhaCJdfQ.VyuFTTZ8YlB2eDcfgsxB87B1qkA7X-ibhv83hE7fk1S0z-vz6_jjMSCjPwWsbjxQwmEQwYJJUSyVQ8aajzmmyQbCasUhRitkb0X1ncnzVumz37FUA8XhJKUgu63Bxfvrt8zuHr2LACnGuAJWq2yjkwIZvnfM2OfHOvq24Q2ClQh8JaQOu2dRb6tow86E1XilpUsvj37vsr0y0e68ev6qjpp4Jzsbp8nlRp0Q47JXtVKZCSffgHszLqo-GgGP7DusgSKmQrF97_Albwv9R0Xq7Ese6Ztr4S_mumOOw_qPHMlK3LagxZKBVXJRuu8EQfxbYyr_cdRJ6j-AZMF2Xn34-Q.7k_5DfvgJAVGBUJHnPSUog.RWasAO9GwRHZxhWN-xxU_jqM3eTNIyjqzwGAmpTZBGpimy0L3BE_aQqdkfRO43LazU4wXHy9P9i4lruYp6KwLA91Beso9V6EBvBSWWbmnYoHLApweH1beQ3Sp5E02p2z_BINVk7u0LAkYR1WmU1yB3YxcYObTkGlfb0-P4CKKGUm1bYN6G1WZgYAf7XMTxydJ11BwakjtPymRpn3Ily-LgUX1_xpYDYEtSdiU0PtkP3mV6vrFl_8j03jRmud-O5JiaR0VeCqXTso1fugPb8hOw.A-Y7Vbmqdj_IrJDFSYVYyw] +09:57:30.661 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[8] Audience (aud) claim [a] present in the JWT but no expected audience value(s) were provided to the JWT Consumer. Expected one of [] as an aud value., [1] The JWT is no longer valid - the evaluation time NumericDate{1741341450 -> Mar 7, 2025, 9:57:30?AM GMT} is on or after the Expiration Time (exp=NumericDate{1432327195 -> May 22, 2015, 8:39:55?PM GMT}) claim value.] +09:57:30.663 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"aud":"a","iss":"i","exp":1432327195,"sub":"s","nbf":1432326535}) rejected due to invalid claims or other invalid content. Additional details: [[17] i isn't okay as an issuer] +09:57:30.663 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"notjti":"lbZ_mLS6w3xBSlvW6ULmkV-uLCk"}) rejected due to invalid claims or other invalid content. Additional details: [[13] The JWT ID (jti) claim is not present.] +09:57:30.664 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":55581529751992}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type (55581529751992 - Cannot cast java.lang.Long to java.lang.String)] +09:57:30.664 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"jti":["S0w3XbslvW6ULmk0", "5iLSQfNgcSGt7A4is"]}) rejected due to invalid claims or other invalid content. Additional details: [[18] The value of the 'jti' claim is not the expected type ([S0w3XbslvW6ULmk0, 5iLSQfNgcSGt7A4is] - Cannot cast java.util.ArrayList to java.lang.String)] +09:57:30.689 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1741342050,"nbf":1741341150,"jti":"qR9qYPoUfryWvyeL73bK2g"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +09:57:30.727 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1741342050,"nbf":1741341150,"jti":"qR9qYPoUfryWvyeL73bK2g"}) rejected due to invalid claims or other invalid content. Additional details: [[21] No typ header parameter present in the innermost JWS/JWE] +09:57:30.756 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1741342050,"nbf":1741341150,"jti":"qR9qYPoUfryWvyeL73bK2g"}) rejected due to invalid claims or other invalid content. Additional details: [[22] Invalid typ header parameter value 'at+jwt'. Expecting 'application/secevent+jwt' or just 'secevent+jwt'.] +09:57:30.776 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1741342050,"nbf":1741341150,"jti":"qR9qYPoUfryWvyeL73bK2g"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +09:57:30.781 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1741342050,"nbf":1741341150,"jti":"qR9qYPoUfryWvyeL73bK2g"}) rejected due to invalid claims or other invalid content. Additional details: [[17] Unexpected exception thrown from validator org.jose4j.jwt.consumer.TypeValidator: java.lang.ClassCastException: class java.util.ArrayList cannot be cast to class java.lang.String (java.util.ArrayList and java.lang.String are in module java.base of loader 'bootstrap') at org.jose4j.lang.JsonHelp.getString(JsonHelp.java:31); org.jose4j.jwx.Headers.getStringHeaderValue(Headers.java:78); org.jose4j.jwx.JsonWebStructure.getHeader(JsonWebStructure.java:153); org.jose4j.jwt.consumer.TypeValidator.validate(TypeValidator.java:37); ...omitted...] +09:57:30.813 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1741342050,"nbf":1741341150,"jti":"qR9qYPoUfryWvyeL73bK2g"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +09:57:30.838 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT (claims->{"sub":"subject","aud":"audience","iss":"issuer","exp":1741342050,"nbf":1741341150,"jti":"qR9qYPoUfryWvyeL73bK2g"}) rejected due to invalid claims or other invalid content. Additional details: [[22] typ header parameter value '' not parsable as a media type org.jose4j.jwt.consumer.TypeValidator$MediaTypeParseException: cannot have empty part] +[INFO] Tests run: 49, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 6.045 s - in org.jose4j.jwt.consumer.JwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest +09:57:30.853 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=DlDE7RN15IR3wKhefLsnFQ). +09:57:30.854 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=uMqSHRRCybCQlKQktBPViw). +09:57:30.854 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=uMqSHRRCybCQlKQktBPViw). +09:57:30.863 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=1pIYxAiJuYOsjhlqwsBSKw). +09:57:30.863 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=1pIYxAiJuYOsjhlqwsBSKw). +09:57:30.863 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=1pIYxAiJuYOsjhlqwsBSKw). +09:57:30.864 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Vg2pdZOoLKMDBJJXx0hIQw). +09:57:30.864 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Vg2pdZOoLKMDBJJXx0hIQw). +09:57:30.864 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Vg2pdZOoLKMDBJJXx0hIQw). +09:57:30.864 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Vg2pdZOoLKMDBJJXx0hIQw). +09:57:30.865 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k5Mw0bBnCCq3eXbA5Szp5A). +09:57:30.865 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k5Mw0bBnCCq3eXbA5Szp5A). +09:57:30.865 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k5Mw0bBnCCq3eXbA5Szp5A). +09:57:30.865 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k5Mw0bBnCCq3eXbA5Szp5A). +09:57:30.865 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=k5Mw0bBnCCq3eXbA5Szp5A). +09:57:30.866 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xE6hYImOWFJ93M9NecWznA). +09:57:30.875 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xE6hYImOWFJ93M9NecWznA). +09:57:30.875 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xE6hYImOWFJ93M9NecWznA). +09:57:30.875 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xE6hYImOWFJ93M9NecWznA). +09:57:30.876 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=5) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xE6hYImOWFJ93M9NecWznA). +09:57:30.876 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=6) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=xE6hYImOWFJ93M9NecWznA). +09:57:30.876 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]) selecting from keys: [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=1}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=2}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=3}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=4}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=5}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=6}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..O9hr6-kRklCMl5e_WkXEWg.axNNPZ-WL2orwpUakVGd20EhHvH5Fmi_ZGIpY806Gj4.xE6hYImOWFJ93M9NecWznA] +09:57:31.009 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +09:57:31.009 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +09:57:31.071 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Message is larger than modulus). +09:57:31.085 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +09:57:31.085 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +09:57:31.086 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +09:57:31.203 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=e2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: A128KW key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: javax.crypto.IllegalBlockSizeException: Integrity check failed; caused by: javax.crypto.IllegalBlockSizeException: Integrity check failed). +09:57:31.230 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r1) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +09:57:31.238 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r2) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Key is too long for unwrapping). +09:57:31.270 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r4) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +09:57:31.352 DEBUG org.jose4j.jwk.DecryptionJwkSelector - Not using key (kid=r3) b/c attempt to decrypt failed trying to disambiguate (org.jose4j.lang.IntegrityException: RSA-OAEP key unwrap/decrypt failed.; caused by: java.security.InvalidKeyException: Unwrapping failed; caused by: javax.crypto.BadPaddingException: Padding error in decryption). +09:57:31.353 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} due to an unexpected exception (org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"RSA-OAEP","enc":"A128GCM"} using attempted decryption to disambiguate from filtered candidate JWKs [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}]) selecting from keys: [org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r1, use=enc, n=lFZ04QwtWu_hHgqlry40DuIhVZyl6ci6FzyLfkeHLH8xfCDLR-rvslxX-Ub3teVnPjZYdUFlZztuDo5kOFsF7TvUQMJhx00VZ6qugm-4LDSJ93ioGuo37vNDjMYBs0dEw_xV38e_m_Jo-oTJZN8xfZFroiR0cRNzac2e98lPa-TCxtOCuVp8Q8ro1Y6nC_1g51iY3nZXHfELX4vUxSh-4z7I0VkzCREQNYx-iKWw6MqEl2qG2mohiwlRexphf-1--8RuJ7FgubewzFv6dP_vCO9cYGi2qB0Gw6b9u8Jb60JYM7xLT3wGTQNfepiXQWESbVorxYiwZODP7d0tteD-eQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e2, use=enc, x=A47oP1eLgWo7NsiKGV2Q983D3oNxLnRDlgtEi7HCtSI, y=4CjFGXRHDmm3g_cSB2YZPYsnxorc4tAEJRD35wBu0ys, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r2, use=enc, n=yzFYB2Nqp5Wb34XQUBGRR33tp1jPVds46D3xwmTXPqjsbr4LMQqPWghtN_qE2bHldPJ9RJUk-i3UxnTAwR1bKLaCj6Aip_blZ4z_wK6IUIkJZk2nPD75YyhTpE9CqoI26lL2KBjMj3gn3cIxHi22BdGshppUbaf-ogH18LQ1bStM63uiflX44ud7GT4JVGaBczoad_cr-R1hs4kWZNdJrzBh7aPxebYnbAVd2CTeyXGYr_GIiq_sgtaBBISGoggruY5r-fva3R4YnhoTnmNeFOLDb99bzDPHbWhyjJ5nqBx7yaw1mT9uBnWno-h423bAT81TvXOJ2ogZ-jsYigx6xw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r4, use=enc, n=srRMqzPSg5CoMyaY5YErUQBRJkn0QhkzSiIIPA6dow3MnhR2_1S-D4aNHdet29Yc6qs9Qh6HIirMWcp2FPaKfaIZaJ-Q_-9gVyPDWlKHp9jSTeSetDCxm401e8XxNMjluGqb-3uQWE9W0Ka7IlDXXW1KhLYZ75xDaP5Y1c2n84uMRMKwylNCKQv0KlHIRDhsPfHx82khTGUb1XMqom7FWO8Ii4whRr7Glw0JiXj8ANHGozVTP-EVkZqFRJmwLG-ndyvsJOclEwwrXYqklFloU7WUwZQ5M08F-g-6XlSNHtaDcFagUUQKXG8zSb6GqXtEfhrs0mwI1D66b3txAf_76w9phkwlHp0Ab_lLuJLAr0j_ACtXbyxUQvHOV8QXmBuSwl7dVqAXFXGBQNGRtdewjPYgzmS4l_SzjgvC8jRTd-xzSof_gIIbSrKEtMnIoKhMCexyYGXkEzfv7aZH92_ZDGa9Cszlyqd3TJrDjj75zrkztc3coMOgbIVHoet_Ptmx, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=e1, use=enc, x=zw4_6TARtwAsHFDw4Q1gr65t6BMl6lXOmmOMA3R0q58, y=O0Gb45b83A8FRe-DH_xJ4H0dsaQVskZMT_RBIKaSGOc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=r3, use=enc, n=pkTznDIyNrI9wvfoFqv3yZpHv5PBeSXxdvOIKtsrKTSXxgDqjfn3jS4CiZidUjW1TzwwkYRZYU3Ei-M7qecudUs1QFdoBUNyd7V_X-ueToD1K-JvQCCrb74bzQWHVfsb2bRfuLw3Tyw3JwnWU3Q-P7OP08INyitwFw9Oz5DvKovtuOyAh3-CT8eSXcPMy2LQTt7WW8h2YeMq1EvndAc67ohiz-q3u2Qqwbbyv-p237mL_90JLE4xMBnLNey4FDjtXbXIq8T8QbvGyn4Dc67ZxH4-izAxi_siA_3z0H7oTYRaeNL4JuNqhoB0R4CgThfofdGVGZVWPyyowzSI-7nxbMHYNNse96wDnbTTKC8pP-qDjExRYjzm4iNueaMzzcq3wAIpR5z2tZp1oULOo43R0kcXC51sKrenJWnqIaIj_WsENRAWWHsrh5IycgySWyytaGVgQHaeBagYJHzRcrhWk10e81M8oMtdPPL1MLS0bbU3CTpDcacr4KyAKAL8sVi7-M2UVqvtWkEZCJ9q1cgOFwcp0t8ZKOpw9OgVeyo-P8HoDpfeXM_WecqNuHSRBlJGbAIfKErBiAUAKFmdEKyHtuUi-Ni6cEwDgjrSxX3apxG_41POrZjZBuuV6FYBcR1wqnTr8k-_z49Kv8ZGF3yszgcV3IQ4qK3-M_qqypnEai8, e=AQAB}]): eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhHQ00ifQ.Ac5pGgt-UTQYOQBO4Z-sABTVhrSr70xjotF0FMXWFqUB4iyoihdLRBTnrpjTb6o-orOqA6EMsv6oDZZelSn3J5Ul-cJSPibXuehlX9VQkZv4NDhP38sUeuXNp0IDtNcJeX2tFI2t6W2uFrCYwIkvh8f8bKHR_yUZslFBWAXRwLX9H2PjyQLXhir3hM1SAOKrQQVjaoPOum1n-3F6p_fh8gZYaxVJiJ2Yq9kdqVwY1wjsEq5sq8JN3j8szfE1GBVYHQhdn2I96bpX9OI97ma-XDIZwmQRgHT1mMByhbTG1SzQiIOc4CXGp5b5zER8j55MVZYB0L3iPYVEELY5YjWULc8XTUeSkejvH3ENuckqBoMijx3vb3N3XUFvY1IW6l0DecXEbv87ead-qSRoCNWKsZKtNX457jhtl9xXO0lrjT5kB_D9z_0SbT2X7ffsZ4vMGBbzsII-Ip_cWwl8xYXxwy9OGVsiRt1F0q1JgtNS35lNP9hZvDJksWPo77ebqXEw.ocPwwRIpGacR3VO1.-XXqFCYM6zkOTl3j.hOTzs7STvZrH3Agtm4DoNg] +09:57:31.475 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=Hzbvc__4g2nqIaYoYkc__w): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc__4g2nqIaYoYkc___] +09:57:31.476 DEBUG o.j.j.c.JwksDecryptionKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable key for JWE w/ header {"alg":"dir","enc":"A128CBC-HS256","kid":"deux"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=one}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}]): eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZGV1eCJ9..JruwzL7TaQ1Fub8Hw6yYmQ.b4B9F3kerVHvyGB5zb40lkTqxulLbMhwFi-qvPfFwwbuyPVPf5s7TeT3i3MLRs0-l_1hP5bPxIEEnOEOBbqTGwO1TWuBn_lQsR8XpQRp6t4H0eaXZsnBqOa3MeEtmGpo.Hzbvc--4g2nqIaYoYkc2pQ] +[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.583 s - in org.jose4j.jwt.consumer.JwksDecryptionKeyResolverUsingJwtConsumerTest +[INFO] Running org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest +09:57:31.493 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"HS512","kid":"nope"} from JWKs [org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=uno}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=two}, org.jose4j.jwk.OctetSequenceJsonWebKey{kty=oct, kid=trois}]): JsonWebSignature{"alg":"HS512","kid":"nope"}->eyJhbGciOiJIUzUxMiIsImtpZCI6Im5vcGUifQ.eyJpc3MiOiJGUk9NIiwiYXVkIjoiVE8iLCJleHAiOjE0MjQyMTg2NzksInN1YiI6IkFCT1VUIn0.lZOnt-l4wIUl667laxBjZgyTZsebfitsKT1yBrEQ-DognQiqEafQaVrFTaV3dJrZDvgDqAKL9FzxOHfdBg8NXw] +09:57:31.531 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.uIRIFrhftV39qJNOdaL8LwrK1prIJIHsP7Gn6jJAVbE2Mx4IkwGzBXDLKMulM1IvKElmSyK_KBg8afywcxoApA] +09:57:31.543 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.21eYfC_ZNf1FQ1Dtvj4rUiM9jYPgf1zJfeE_b2fclgu36KAN141ICqVjNxQqlK_7Wbct_FDxgyHvej_LEigb2Q] +09:57:31.556 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +09:57:31.557 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +09:57:31.557 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtSignatureException: JWT rejected due to invalid signature. Additional details: [[9] Invalid JWS Signature: JsonWebSignature{"alg":"RS256"}->eyJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzNzgwOSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.pgBu9S8g7MC2BN9YNlWD9JhjzWbQVjqpmErW4hMFncKD8bUidIbMBJSI3URXvnMJrLrAC5eB2gb6DccF_txQaqX1X81JbTSdQ44_P1W-1uIIkfIXUvM6OXv48W-CPm8xGuetQ1ayHgU_1ljtdkbdUHZ6irgaeIrFMgZX0Jdb9Eydnfhwvno2oGk3y6ruq2KgKABIdzgvJXfwdOFGn1z0CxwQSVDkFRLsMsBljTwfTd0v3G8OXT8WRMZMGVyAgtKVu3XJyrPNntVqrzdgQQma6S06Y9J9V9t0AlgEAn2B4TqMxYcu1Tjr7bBL_v83zEXhbdcFBYLfJg-LY5wE6rA-dA] +09:57:31.675 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES256"}->eyJhbGciOiJFUzI1NiJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTEyNywiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.UE4B0IVPRip-3TDKhNAadCuj_Bf5PlEAn9K94Zd7mP25WNZwxDbQpDElZTZSp-3ngPqQyPGj27emYRHhOnFSAQ] +09:57:31.676 DEBUG o.j.j.c.SimpleJwtConsumerTestHelp - Expected exception: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES384"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=yd4yK8EJWNY-fyB0veOTNqDt_HqpPa45VTSJjIiI8vM, y=UspqZi9nPaUwBY8kD6MPDHslh5f6UMnAiXsg1l3i6UM, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=3WPq7AnMkQekA1ogYFqNS5NBOXPs68xadKvtsn4pgas, y=CEvQFmGwKv96TQYRrgS-nFl9xWfN8PuLnIwBVmtpfp0, crv=P-256}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=DUYwuVdWtzfd2nkfQ7YEE_3ORRv3o0PYX39qNGVNlyA, y=qxxvewtvj61pnGDS7hWZ026oZehJxtQO3-9oVa6YdT8, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=mGOTvaqxy6AlxHXJFqQc5WSfH3Mjso0nlleF4a1ebSMgnqpmK_s6BSP0v9CyKyn_sBNpsH6dlOsks4qwb88SdvoWpMo2ZCIt8YlefirEaT9J8OQycxMvk7U1t6vCyN8Z68FrwhzzsmnNI_GC723OfMhcEZiRGNRJadPCMPfY3q5PgRrCjUS4v2hQjaicDpZETgbGxWNuNiIPk2CGhG3LJIUX4rx5zrFPQuUKH2Z1zH4E39i3Ab0WBATY0warvlImI5_rT-uCvvepnaQ6Mc4ImpS3anLNjfPlaNVajl5aRuzzRO77XePN-XzFJUVbC_v1-s2IcJf8uB-PMKAtRqz_kw, e=AQAB}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, n=4SoqXJikILVhuwpeOYjbi_KGFXfvMaiBtoDm7nKsVc8ayQ4RBGbQdqHIt6gxSSTHrRSbQ2s5lAHfeyBJ9myQitCwxHFzjIDGcp5_u0wNWJbWUsDnbS-pwAQsZXZ3m6u_aDEC4sCTjOuotzwJniehVAkm2B1OnoYVhooKt9CTjVj1hwMf8Cpr171Vt559LyzUhRml6Se_AJWG_oFLV2c5ALCi2USfq2G_zoXFt9Kc93LJ9XoPy-hbQXA13OXwi9YL_BDLk8nd7QfaUgm77-j6RbOYg0l0PTloggw7km7M1D8iDASfkuII-Dzqedcm3KQb0Quo20HkirlIk67E-jOk6Q, e=AQAB}]): JsonWebSignature{"alg":"ES384"}->eyJhbGciOiJFUzM4NCJ9.eyJzdWIiOiJtZSIsImV4cCI6MTQ5NDQzOTIzMSwiYXVkIjoidGhlIGF1ZGllbmNlIiwiaXNzIjoidGhlIGlzc3VlciJ9.NyRtG_eFmMLQ0XkW5kvdSpzYsm6P5M3U8EBFKIhD-jw8E7FOYw9PZ3_o1PWuLWH3XeArZMW7-bAIVxo2bHqJsSUtB6Tf0NWPtCpUF2c1vbuRXEXkGrCUmc4sKyOBjimC] +09:57:31.700 DEBUG o.j.j.c.JwksVerificationKeyResolverUsingJwtConsumerTest - this was expected and is okay: org.jose4j.jwt.consumer.InvalidJwtException: JWT processing failed. Additional details: [[17] Unable to process JOSE object (cause: org.jose4j.lang.UnresolvableKeyException: Unable to find a suitable verification key for JWS w/ header {"alg":"ES256","kid":"8a10l"} from JWKs [org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00r, use=sig, x=AZkOsR09YQeFcD6rhINHWAaAr8DMx9ndFzum50o5KLLUjqF7opKI7TxR5LP_4uUvG2jojF57xxWVwWi2otdETeI-, y=AadJxOSpjf_4VxRjTT_FdAtFX8Pw-CBpaoX-OQPPQ8o0kOrj5nzIltwnEORDldLFIkQQzgTXMzBnWyQurVHU5pUF, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00q, use=sig, x=3n74sKXRbaBNw9qOGslnl-WcNCdC75cWo_UquiGUFKdDM3hudthywE5y0R6d2Li8, y=YbZ_0lregvTboKmUX7VE7eknQC1yETKUdHzt_YMX4zbTyOxgZL6A38AVfY8Q8HWd, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00p, use=sig, x=S-EbFKVG-7pXjdgM9SPPw8rN3V8-2uX4bNg4y8R7EhA, y=KTtyNGz9B9_QrkFf7mP90YiH6F40fAYfqpzQh8HG7tc, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00o, use=sig, n=kM-83p_Qaq-1FuxLHH6Y7jQeBT5MK9iHGB75Blnit8rMIcsns72Ls1uhEYiyB3_icK7ibLr2_AHiIl7MnJBY2cCquuwiTccDM5AYUccdypliSlVeAL0MBa_0xfpvBJw8fB45wX6kJKftbQI8xjvFhqSIuGNyQOzFXnJ_mCBOLv-6Nzn79qWxh47mQ7NJk2wSYdFDsz0NNGjBA2VQ9U6weqL1viZ1sbzXr-bJWCjjEYmKC5k0sjGGXJuvMPEqBY2q68kFXD3kiuslQ3tNS1j4d-IraadxpNVtedQ44-xM7MC-WFm2f5eO0LmJRzyipGNPkTer66q6MSEESguyhsoLNQ, e=AQAB}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00n, use=sig, x=ADoTal4nAvVCgicprEBBFOzNKUKVJl1Ph8sISl3Z3tz7TJZlQB485LJ3xil-EmWvqW1-sKFl7dY2YtrGUZvjGp0O, y=AXVB58hIK7buMZmRgDU4hrGvcVQLXa-77_F755OKIkuWP5IJ6GdjFvaRHfIbbHMp-whqjmRrlwfYPN1xmyCGSzpT, crv=P-521}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00m, use=sig, x=5Y4xK9IBGJq5-E6QAVdpiqZb9Z-_tro_rX9TAUdWD3jiVS5N-blEnu5zWzoUoiJk, y=ZDFGBLBbiuvHLMOJ3DoOSRLU94uu5y3s03__HaaaLU04Efc4nGdY3vhTQ4kxEqVj, crv=P-384}, org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, kid=8a00l, use=sig, x=CWzKLukg4yQzi4oM-2m9M-ClxbU4e6P9G_HRn9A0edI, y=UB1OL_eziV6lA5J0PiAuzoKQU_YbXojbjh0sfxtVlOU, crv=P-256}, org.jose4j.jwk.RsaJsonWebKey{kty=RSA, kid=8a00k, use=sig, n=ux8LdF-7g3X1BlqglZUw36mqjd9P0JWfWxJYvR6pCFSyqLrETc-fL9_lTG3orohkGnEPe7G-BO65ldF44pYEe3eZzcEuEFtiO5W4_Jap1Z430vdYgC_nZtENIJDWlsGM9ev-cOld7By-8l3-wAyuspOKZijWtx6K57VLajyUHBSmbUtaeCwHQOGyMOV1V-cskbTO2u_HrLOLLkSv9oZrznAwpx_paFHy-aAsdFhb7EiBzwqqHQButo3aT3DsR69gbW_Nmrf6tfkril6B3ePKV4od_5jowa6V3765K6v2L4NER7fuZ2hJVbIc0eJXY8tL3NlkBnjnmQ8DBWQR81Ayhw, e=AQAB}]): JsonWebSignature{"alg":"ES256","kid":"8a10l"}->eyJhbGciOiJFUzI1NiIsImtpZCI6IjhhMTBsIn0.eyJzdWIiOiJoYWlsaWUiLCJhdWQiOiJhIiwianRpIjoiRmUwZ1h1UGpmcHoxSHEzdzRaaUZIQiIsImlzcyI6Imh0dHBzOlwvXC9sb2NhbGhvc3Q6OTAzMSIsImlhdCI6MTQyMTA5Mzg1OSwiZXhwIjoxNDIxMDk0NDU5LCJub25jZSI6ImZmcyIsImFjciI6InVybjpvYXNpczpuYW1lczp0YzpTQU1MOjIuMDphYzpjbGFzc2VzOlBhc3N3b3JkIiwiYXV0aF90aW1lIjoxNDIxMDkzMzc2fQ.gzJQZRErEHI_v6z6dZboTPzL7p9_wXrMJIWnYZFEENgq3E1InbrZuQM3wB-mJ5r33kwMibJY7Qi4y-jvk0IYqQ] +[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.207 s - in org.jose4j.jwt.consumer.JwksVerificationKeyResolverUsingJwtConsumerTest +[INFO] Running org.jose4j.jwt.NumericDateTest +09:57:31.714 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775807} +09:57:31.714 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372034707292160} +09:57:31.714 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223371822106411107} +09:57:31.714 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{4611686018427387903} +09:57:31.714 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{2305843009213693951} +09:57:31.714 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{144115188075855871} +09:57:31.714 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9232604641496272} +09:57:31.714 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854776} +09:57:31.727 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854775 -> Aug 17, 292278994, 7:12:55?AM GMT} +09:57:31.728 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{9223372036854774 -> Aug 17, 292278994, 7:12:54?AM GMT} +09:57:31.728 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775808} +09:57:31.728 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372034707292161} +09:57:31.728 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-4611686018427387904} +09:57:31.728 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-184467440737095516} +09:57:31.728 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9232604641496272} +09:57:31.728 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854776} +09:57:31.764 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854775 -> Dec 2, 292269055, 4:47:05?PM GMT} +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - ok NumericDate{-9223372036854774 -> Dec 2, 292269055, 4:47:06?PM GMT} +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 1 = -9223372036854775808 +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 60 = -9223372036854775749 +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 2147483647 = -9223372034707292162 +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 9223372036854775807 + 9223372036854775807 = -2 +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 2147483647 + 9223372036854775807 = -9223372034707292162 +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 60 + 9223372036854775807 = -9223372036854775749 +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: 1 + 9223372036854775807 = -9223372036854775808 +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -1 = 9223372036854775807 +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -100 = 9223372036854775708 +09:57:31.765 DEBUG org.jose4j.jwt.NumericDateTest - Expected: java.lang.ArithmeticException: long overflow adding: -9223372036854775808 + -2147483648 = 9223372034707292160 +[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.05 s - in org.jose4j.jwt.NumericDateTest [INFO] [INFO] Results: [INFO] @@ -4518,8 +4554,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 39.762 s -[INFO] Finished at: 2026-04-09T16:07:26Z +[INFO] Total time: 02:07 min +[INFO] Finished at: 2025-03-07T09:58:02Z [INFO] ------------------------------------------------------------------------ create-stamp debian/debhelper-build-stamp dh_prep @@ -4543,8 +4579,8 @@ [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ -[INFO] Total time: 0.806 s -[INFO] Finished at: 2026-04-09T16:07:28Z +[INFO] Total time: 5.549 s +[INFO] Finished at: 2025-03-07T09:58:19Z [INFO] ------------------------------------------------------------------------ mh_resolve_dependencies --non-interactive --offline --build -plibjose4j-java --base-directory=/build/reproducible-path/libjose4j-java-0.9.6 --non-explore Analysing pom.xml... @@ -4570,12 +4606,14 @@ dpkg-buildpackage: info: binary-only upload (no source included) dpkg-genchanges: info: including full source code in upload I: copying local configuration +I: user script /srv/workspace/pbuilder/2178243/tmp/hooks/B01_cleanup starting +I: user script /srv/workspace/pbuilder/2178243/tmp/hooks/B01_cleanup finished I: unmounting dev/ptmx filesystem I: unmounting dev/pts filesystem I: unmounting dev/shm filesystem I: unmounting proc filesystem I: unmounting sys filesystem I: cleaning the build env -I: removing directory /srv/workspace/pbuilder/1363228 and its subdirectories -I: Current time: Thu Apr 9 04:07:32 -12 2026 -I: pbuilder-time-stamp: 1775750852 +I: removing directory /srv/workspace/pbuilder/2178243 and its subdirectories +I: Current time: Fri Mar 7 23:58:42 +14 2025 +I: pbuilder-time-stamp: 1741341522