Bug#1057933: libjose4j-java: FTBFS: IOException: Only named ECParameters supported

Santiago Vila sanvila at debian.org
Sun Dec 10 19:18:03 GMT 2023


Package: src:libjose4j-java
Version: 0.7.12-2
Severity: serious
Tags: ftbfs

Dear maintainer:

During a rebuild of all packages in unstable, your package failed to build:

--------------------------------------------------------------------------------
[...]
  debian/rules binary
dh binary
    dh_update_autotools_config
    dh_autoreconf
    dh_auto_configure
	mh_patchpoms -plibjose4j-java --debian-build --keep-pom-version --maven-repo=/<<PKGBUILDDIR>>/debian/maven-repo
    dh_auto_build
	/usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/<<PKGBUILDDIR>> -Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/<<PKGBUILDDIR>>/debian/maven.properties org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml -Ddebian.dir=/<<PKGBUILDDIR>>/debian -Dmaven.repo.local=/<<PKGBUILDDIR>>/debian/maven-repo --batch-mode package -DskipTests -Dnotimestamp=true -Dlocale=en_US
OpenJDK 64-Bit Server VM warning: Options -Xverify:none and -noverify were deprecated in JDK 13 and will likely be removed in a future release.
[INFO] Scanning for projects...
[INFO]
[INFO] ----------------------< org.bitbucket.b_c:jose4j >----------------------
[INFO] Building jose4j 0.7.12
[INFO] --------------------------------[ jar ]---------------------------------

[... snipped ...]

	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:568)
	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
	at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
	at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
	at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
	at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
	at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
	at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
	at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
	at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
	at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
14:19:37.806 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {}
org.jose4j.lang.JoseException: Missing required 'kty' parameter.
	at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228)
	at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220)
	at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238)
	at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
	at org.jose4j.jwk.JsonWebKeySetTest.testParseSetContainingInvalid(JsonWebKeySetTest.java:327)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:568)
	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
	at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
	at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
	at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
	at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
	at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
	at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
	at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
	at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
	at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jwk.JsonWebKeySetTest
[INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest
org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk, y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2, crv=P-521}
[ERROR] Tests run: 6, Failures: 2, Errors: 0, Skipped: 0, Time elapsed: 0.063 s <<< FAILURE! - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest
[ERROR] testParseExampleWithPrivate256(org.jose4j.jwk.EllipticCurveJsonWebKeyTest)  Time elapsed: 0.031 s  <<< FAILURE!
java.lang.AssertionError:
expected:<EC Private Key [8b:e2:14:0f:3a:17:e9:25:d1:ae:df:18:a3:b2:9a:fd:63:04:41:11]
             X: 7fcdce2770f6c45d4183cbee6fdb4b7b580733357be9ef13bacf6e3c7bd15445
             Y: c7f144cd1bbd9b7e872cdfedb9eeb9f4b3695d6ea90b24ad8a4623288588e5ad
> but was:<sun.security.ec.ECPrivateKeyImpl at f7754045>
	at org.jose4j.jwk.EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate256(EllipticCurveJsonWebKeyTest.java:53)

[ERROR] testParseExampleWithPrivate512(org.jose4j.jwk.EllipticCurveJsonWebKeyTest)  Time elapsed: 0.029 s  <<< FAILURE!
java.lang.AssertionError:
expected:<EC Private Key [37:fe:6d:9b:cb:45:df:bb:57:16:94:75:87:d7:e7:46:6d:c4:dc:c5]
             X: 1e929050f124fc6bc55c7d5393365df9def4ab0c22cb25798f934eb04e3c6bae3701a57a7910e9d81bf363159e8ebcb155d6349f4bdb6ccf8a94c5c59c7aac101a4
             Y: 34a6440e376750d2371fd1bdc2c8f3b71d2f4ee5ea3432c815cca31560fe5d9387ec774b55838630e5cbbf5a8cbe0a91dd0064c6999a1f6e6e67faddede4c8c8f6
> but was:<sun.security.ec.ECPrivateKeyImpl at 44924e16>
	at org.jose4j.jwk.EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate512(EllipticCurveJsonWebKeyTest.java:94)

[INFO] Running org.jose4j.jwk.OctJwkGeneratorTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctJwkGeneratorTest
[INFO] Running org.jose4j.jwk.X5cTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.X5cTest
[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.RsaJsonWebKeyTest
[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.DecryptionJwkSelectorTest
[INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.182 s - in org.jose4j.jwk.RsaJwkGeneratorTest
[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest
14:19:38.084 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: {  "keys": [    {      "kty": "EC",      "kid": "96",      "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg",      "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "a9",      "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY",      "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "this one shouldn't work 'cause there's no y",      "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "2d",      "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw",      "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4",      "crv": "P-256"    }  ]}. {}
org.jose4j.lang.JoseException: Missing required 'y' parameter.
	at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228)
	at org.jose4j.jwk.PublicJsonWebKey.getBigIntFromBase64UrlEncodedParam(PublicJsonWebKey.java:245)
	at org.jose4j.jwk.EllipticCurveJsonWebKey.<init>(EllipticCurveJsonWebKey.java:69)
	at org.jose4j.jwk.EllipticCurveJsonWebKey.<init>(EllipticCurveJsonWebKey.java:57)
	at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:245)
	at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
	at org.jose4j.jwk.JsonWebKeySetAnotherTest.oneBadApple(JsonWebKeySetAnotherTest.java:51)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:568)
	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
	at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
	at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
	at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
	at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
	at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
	at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
	at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
	at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
	at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
14:19:38.090 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: {  "keys": [    {      "kty": "EC",      "kid": "96",      "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg",      "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "a9",      "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY",      "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ",      "crv": "P-256"    },   {     "kty":"UNKNOWN",     "crv":"whatever",     "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo"   }    {      "kty": "EC",      "kid": "2d",      "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw",      "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4",      "crv": "P-256"    }  ]}. {}
org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'
	at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:249)
	at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
	at org.jose4j.jwk.JsonWebKeySetAnotherTest.oneUnknownKTY(JsonWebKeySetAnotherTest.java:91)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:568)
	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
	at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
	at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
	at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
	at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
	at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
	at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
	at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
	at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
	at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest
[INFO] Running org.jose4j.jwk.HttpsJwksTest
[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.002 s - in org.jose4j.jwk.HttpsJwksTest
[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest
[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest
[INFO] Running org.jose4j.jwk.ExtraJwkParametersTest
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.ExtraJwkParametersTest
[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwk.EcJwkGeneratorTest
[INFO] Running org.jose4j.jwk.JsonWebKeyTest
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwk.JsonWebKeyTest
[INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest
[INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest
14:19:38.142 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. {}
org.jose4j.lang.JoseException: Missing required 'kty' parameter.
	at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228)
	at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220)
	at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238)
	at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
	at org.jose4j.jwk.VerificationJwkSelectorTest.noKidTestRyoItoJwksEndpoint(VerificationJwkSelectorTest.java:593)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.base/java.lang.reflect.Method.invoke(Method.java:568)
	at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
	at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
	at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
	at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
	at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
	at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
	at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
	at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
	at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
	at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
	at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
	at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
	at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
	at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
	at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
	at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
	at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
	at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
	at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
	at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
14:19:38.170 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying signature: java.security.SignatureException: Signature length not correct: got 512 but was expecting 256
14:19:38.171 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying signature: java.security.SignatureException: Signature length not correct: got 256 but was expecting 512
[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.038 s - in org.jose4j.jwk.VerificationJwkSelectorTest
[INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest
[INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest
[INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest
[INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test
[INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest
Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0
LfkHot2nGTVlmfxbgxQfMg
[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest
[INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest
[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest
[INFO] Running org.jose4j.jwe.InvalidCurveTest
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.JoseException: epk is invalid for P-256
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w
14:19:38.227 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.JoseException: epk is invalid for P-256
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.InvalidCurveTest
[INFO] Running org.jose4j.jwe.NegativeJweKeyTest
14:19:38.230 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128).
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits).
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 7736 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 4688 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 7736 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 4688 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 7736 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 4688 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.PublicKey
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided.
[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s - in org.jose4j.jwe.NegativeJweKeyTest
[INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest
eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiR3k4cW44bHZicTY3d3dpbCJ9.o8IVuW9V6aEi6IeXbdtKfbptu4nPSNCK2TpEJAKyt4VVrlmJNdYbsQ.mSf3hJfjRI__E33JN_ZOLA.6CyLaFUTHa2jyp8xnFmDtw.Znr7LrCAdqpVe-_uS7CTZQ
[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.683 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest
[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest
[INFO] Running org.jose4j.jwe.GeneralJweTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.GeneralJweTest
[INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest
[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.003 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest
[INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest
[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest
[INFO] Running org.jose4j.jwe.CritHeaderTest
14:19:38.994 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical.
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.CritHeaderTest
[INFO] Running org.jose4j.jwe.ZipTest
eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..DmnUfeLCmXlD452XuQ2nGg.VX8u83sdRbSL5LVdZD8LfXYPnpBCjlu0iZkkOSBWpdn62Qy4w-FHToC8oBtKT2hF-TPpap0D47bwIYRDpsxL9g.FlrsXCg0nPW8j1kwJUvfcg
eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..tb8Qom4QKLPTRz8SrMDsgg.77HGRRSIlWuKK1wghDSNpgkLYYbNT4pNNd2sQ3g-gOhPJj4zLKF8-ufqsxviBggBJAzC7xbTHYPgbtn9B2x5ZVqNmS6-H5V4mAf9sbiWHLjuw7SkB7A8JkiHM9u5YpmebFPpohPdbDMPSqXMzVWLNLXquaTLRlCQDX1zpAaZptxPo3n9VJtOqDJXBPn_JMJwpXnIGiZlEvDCeRDHzQFRH5zSV09O_K8amgDBfY_fVKthR_FS9KSGUf8qi4N-3yHjEmI91OoAqrtAV9raHStA8-ZZp7tZZyaGq-DeOmtQInmFWVwwWmxGIzzDsY3ungDyw2uvNuRZP4UINPTRKV-GYsa-AfoFxBciBzXxGxGQYTQxKVj9sB8laJEiSwpkzYBV.7togQFW_L2snM3HrgZ_YbQ
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwe.ZipTest
[INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest
[INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest
14:19:39.006 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE
14:19:39.015 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement at 4ad3d266
14:19:39.020 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement at 3533df16
14:19:39.024 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement at 15d0849
14:19:39.025 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key
14:19:39.026 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE
14:19:39.072 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec at fffe80f7
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.065 s - in org.jose4j.jwe.JweCryptoPrimitiveTest
[INFO] Running org.jose4j.jwe.JsonWebEncryptionTest
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.jose4j.jwe.JsonWebEncryptionTest
[INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest
[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest
[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest
[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest
14:19:39.116 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiXzNlVHhENFJHdHFlaUo1Y2Z6LTdqWksxc3hwdV91bzJVb201QTFreTJfQSIsInkiOiJmODJwYXRzelFmZC1fSnZ2WXhVcVdpbEYxdXgyeHN6WWlUeWkyV3h6cF9nIiwiY3J2IjoiUC0yNTYifX0.-csTe0bWJRkYg95Glm7VrRI4fGYE2zP7_Dj--obsW-k77kzuX76DfA.s5KCZKtid9N-iOPFyDNZ3w.Y9-LL2goWcwohDTNBNkqHFgVXRXgLy6qh7rwycOri4EyJe9syl_y7AdlqIq4O7sEbjKpowuTtSPo5ntHtR3FMQ.Pe3Q3zKIKfEFrBTLOQ0p2Q
14:19:39.121 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiclZsNWZiVnlWa29vX0N6ZDdRQktINVl3RjAxelVISFk2NERHT2YtS0taWSIsInkiOiJpUkxIM1NSVG4wQmNEd3FOUExta2I4S1JzeGVIbDlnZzZpZTdpc3RWZm5NIiwiY3J2IjoiUC0yNTYifX0.rZ3Fpc5w3AFak3h8oy39ybGvuXXnd0t9FJy4G6P_sPIc3XJpa5ayV9Kp-WUiXMa0uAj4XwsAR4Q.J83ZleRV61sgM86ZAalkgQ.6nQ2fltrj3geYIcb-LHR9FtlUKCFnbHAHZoVOV-82HJnIH3d64Ya1jXmElTlCvAiaGhSFIoD2IBFYyPJlik7pg.4uvw_hGOLV4g9C2BUav8C47dpT0huC1L
14:19:39.126 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicFFTV1FHb2djMnNVWDMyZllJTmZKX0JwT0lyVDNaMWt2MU1VekhHZW1RayIsInkiOiJBTWJqdWtiTVNsYkxQRlVXS01WVXZYUHlVTmtiNnRCeHRKMHBLVm1hellZIiwiY3J2IjoiUC0yNTYifX0.8tk9OJomyqhANLFgUID0a9hSJy0g9Ln4nR1Sw84nB5TqRxxv2RzMmhEptI9XalIyrkfZAllz2cBM5OlgjSzsoXBXijQJgH67.2CMb5alcjTJqQnwPHMsDRw.XusR_5us3iPH4xfo67s0vyPSMXlX1HJyxdp8piVA85_C4YsVJbJWtMl1piTnSpv87_9viCIz0lVFGujy9wtduw.lmxDFAVwP6LhABIu-3uReOhPi6-8BISfd-qOeK9ASqI
14:19:39.130 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQ2IxdWlUS0UwNmMxb0oxcnZGeDJHV3FaSlJHV1htbDlzMmNpR1I5ajFFTSIsInkiOiJrbWNaVnBrWFhMUEhGRHVrTVJxR0hLMU04al9MY1VmbUE1R0lSaTdTRE9ZIiwiY3J2IjoiUC0yNTYifX0.jVwnetAsMUemLvb8rgd6UdFGJaZC8O_25h-tPwH8KhQDfLtXl-2jaQ.VdRkiP2boYiZ5mk-lTK1zA.0RTJjrijj47BBtI9TiMBpmJFXoyCVuWhgmad9R2rrHsThlnWo_H5NKGPYa76DtiLRp8xiMs-bml8drULdv5HNA.dwcB_qFgZeBnTG-stoNcHA
14:19:39.135 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiLTRvZjg3a2RpRXBBUElhZjd6WS0zVWRMX1JMUl8xdUpNV25SV3UzWENLTSIsInkiOiJRSllNWUc0LTlBWFBMdnlQb1JhelRNWnJtb0piOW1CLXItM29WZjdMUVE4IiwiY3J2IjoiUC0yNTYifX0.TTY_hdO0pKX15X4rP7ElsOKPidArqF0cIZvB2iA_a1VIOUr1WmvL_cbxV7-K7np97wBrhxUfaPo.F1TviHXbGCEXCqXPoy1gug.Duzf4eX_GV99_ToFB1eWgdfYca9xLnU6hZwV06FjI5oWePTCcxwhAIhX4nts1QJ9lRhDtfVWCv-Pwl5vvdsZVw.4Ppq_m-W7y7UMF59WN6OgaHImG6OEJ3N
14:19:39.140 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiblVjYVdmMWYtekJkVUQ0RFlWalBoVTQwbXYyajhYTWl2VWJhNWhkTXdCZyIsInkiOiI1a2hCZlFGVDFOcG9DQ1lPNUJaaG8tT2h1VTZTUTByZk94NnBhRTR0OXpjIiwiY3J2IjoiUC0yNTYifX0.8g2EViEz0o4RS3Sty1h81nnaEW5xjA0mPcQATQFAZ50Zfs4KndaopVcGmj4XH03g2fyAnTnLjreCnbflIqAmKLDKegdsnUMY.BdoZxwV2jk0XPBGlCXHGAQ.goQ4PODwq1C-MonhQBhpjFBtA0XakpXyHpQMSepGHY--Snvznm3v0ntT4EyKe77wRP-A-kbTEObjw-h98wEocg.LtSpcLUSWJIJVJrO3x-Hlgf40UeSnycmV86nJF2kYt8
14:19:39.145 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUGRJNWM5QXVfMElvTzRmSkx2dTZpWTFlanBoZVMzcWdVWk13RmhBYlhoUSIsInkiOiIyNzNfU29uZHhyQV9rTUtwZnNIYUYwQUhLSE1NM0VGeTVwMU42MVEtTVVRIiwiY3J2IjoiUC0yNTYifX0.iASJx9JP40kO6AG4MUiUCn9HaV-74trsExuYTm1XfRqPP87dmv2gxQ.b_V4ks9RQ6LvcPXotjRyTA.5Qj_BPTOya0b1hd-1VfWUo_GxBdPHVHMK3P2hQEqpE6x-3rJV7WtG-4a1vEvtuDRkHd0fzIkMMVOibo69KnpaA.b_wX6mYSxKKleu3Umlh7Ug
14:19:39.150 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiX05HSTFoYmFDRFdxNWYtTVhBczg0bEwyMWU2cVYxVjdtdDluQXFyZ0VRYyIsInkiOiJnMFMzQld3a21QV1ZwbVkzQzJ3N1FrUU93RmRIZjY4QUFySFBNek9VRVdFIiwiY3J2IjoiUC0yNTYifX0.w0hIi2jtRJ7XcLHK62aJkjpXaJykD4k_RHzX54xhGvNkMdHQuX76KviEAgz8_TtzYFHHx3SY06k.eTrXGRFcZarRRT14uWjloQ.c6LbF385mg9vzVMRy4Od9issIqyybItMEr4-rnBreqBuTKxiU8ISmVfnrgdV1Q2HaF9ZRyx9nhUvUHCzNWGFOQ.fY6dx4n8H4vomfwyZUfbBxOpSfCWBqnP
14:19:39.155 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZXFZR1BqWjg1RVNnVTQ1cVZrZThkOU9kMEZMUWs5ZEFidWtyR2R1Y1F3YyIsInkiOiJXaDZEUjZUSE1KN21TOVFrcVhKcWM2TkEtajA0NXVQX3ZoWDY1TWdGVFYwIiwiY3J2IjoiUC0yNTYifX0.aHeT8Ca34khE5Zl35VSV5x0njvxsj54eDdVMMH9z9Gbm-4x3ZBXMvo8XVx684ZZMZ-m9d6BQaz7_vrcxetBcAaIZ3dn6QRy_.qP6GlXisBbo_CmA8vwlfeA.EfjKaOVXvTtZBB5czomvXAeS0BOnF3jJeDdynzh3_dDyH08x5-tAzQuRnrh61LHu8uPkUAcz4Vmr3KyZdPT_Pw.hea2opsfyiUjE3YwNjNhx_eUs7JOylyk8TeOPKrzhUQ
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest
[INFO] Running org.jose4j.jwe.NegativeJweWrappingTest
14:19:39.162 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error at java.base/sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:369); java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:282); java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...
14:19:39.162 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.164 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error at java.base/sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:369); java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:282); java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...
14:19:39.164 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.166 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error at java.base/sun.security.rsa.RSAPadding.unpadOAEP(RSAPadding.java:488); java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:284); java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...
14:19:39.166 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.168 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error at java.base/sun.security.rsa.RSAPadding.unpadOAEP(RSAPadding.java:488); java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:284); java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...
14:19:39.168 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.170 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA
14:19:39.171 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.173 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384).
eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.eqrzAN7XdUGevOenodfF_hhSx3GgiZ0icTaTHgqsilFOHc6gbdJPQXfsWUMl7YOqhj6fHsRWpicDs1iZrjynHJipqIN4hEYGF3cqEG1KjWRhZckfGtOym0JWYaoWxKC1oqI4XKtOSe_rMnymB67hDCjQ30k8Yc53o7uXvRB9-dMYZwrAKe0j2LFiqUOHA4UhUCHZiUNsSzLCVDVgBvxrolEySDhC8B4Tf7A8tQz3NFf-laCUupy2fQzd6vVGNl00271AGqm9a_CQtiIVvH7bGnMrWMtg47WB50C0xx0GnykbEa5uRRYORnA23I3SYHFKGH16og44TU98PfcfT6IZjQ.shk-LQhhBKJ7PKkKGinohg.gwPbcXRuPQkyGVf_YOisDbDfOD0E9e76ieD9yrfkpUq7yKOdsB1lWyzFjbMo3C_OO5mzRAp8E7-7KJbNmrnXlc98ENeV6po0nD3nFjQhsOM.d78UrgBln74CKtH8nT-9EQ
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jwe.NegativeJweWrappingTest
[INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest
[INFO] Running org.jose4j.lang.MathsTest
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.lang.MathsTest
[INFO] Running org.jose4j.lang.ByteUtilTest
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length
[INFO] Tests run: 30, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.lang.ByteUtilTest
[INFO] Running org.jose4j.lang.JsonHelpTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.lang.JsonHelpTest
[INFO] Running org.jose4j.cookbook.JoseCookbookTest
[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.16 s - in org.jose4j.cookbook.JoseCookbookTest
[INFO]
[INFO] Results:
[INFO]
[ERROR] Failures:
[ERROR]   EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate256:53 expected:<EC Private Key [8b:e2:14:0f:3a:17:e9:25:d1:ae:df:18:a3:b2:9a:fd:63:04:41:11]
             X: 7fcdce2770f6c45d4183cbee6fdb4b7b580733357be9ef13bacf6e3c7bd15445
             Y: c7f144cd1bbd9b7e872cdfedb9eeb9f4b3695d6ea90b24ad8a4623288588e5ad
> but was:<sun.security.ec.ECPrivateKeyImpl at f7754045>
[ERROR]   EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate512:94 expected:<EC Private Key [37:fe:6d:9b:cb:45:df:bb:57:16:94:75:87:d7:e7:46:6d:c4:dc:c5]
             X: 1e929050f124fc6bc55c7d5393365df9def4ab0c22cb25798f934eb04e3c6bae3701a57a7910e9d81bf363159e8ebcb155d6349f4bdb6ccf8a94c5c59c7aac101a4
             Y: 34a6440e376750d2371fd1bdc2c8f3b71d2f4ee5ea3432c815cca31560fe5d9387ec774b55838630e5cbbf5a8cbe0a91dd0064c6999a1f6e6e67faddede4c8c8f6
> but was:<sun.security.ec.ECPrivateKeyImpl at 44924e16>
[ERROR] Errors:
[ERROR]   KeyPairUtilTest.ecPublicKeyEncoding:81 » InvalidKeySpec java.security.InvalidK...
[INFO]
[ERROR] Tests run: 575, Failures: 2, Errors: 1, Skipped: 3
[INFO]
[INFO] ------------------------------------------------------------------------
[INFO] BUILD FAILURE
[INFO] ------------------------------------------------------------------------
[INFO] Total time:  11.824 s
[INFO] Finished at: 2023-12-10T14:19:41Z
[INFO] ------------------------------------------------------------------------
[ERROR] Failed to execute goal org.apache.maven.plugins:maven-surefire-plugin:2.22.3:test (default-test) on project jose4j: There are test failures.
[ERROR]
[ERROR] Please refer to /<<PKGBUILDDIR>>/target/surefire-reports for the individual test results.
[ERROR] Please refer to dump files (if any exist) [date].dump, [date]-jvmRun[N].dump and [date].dumpstream.
[ERROR] -> [Help 1]
[ERROR]
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR]
[ERROR] For more information about the errors and possible solutions, please read the following articles:
[ERROR] [Help 1] http://cwiki.apache.org/confluence/display/MAVEN/MojoFailureException
dh_auto_test: error: /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/<<PKGBUILDDIR>> -Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/<<PKGBUILDDIR>>/debian/maven.properties org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml -Ddebian.dir=/<<PKGBUILDDIR>>/debian -Dmaven.repo.local=/<<PKGBUILDDIR>>/debian/maven-repo --batch-mode test returned exit code 1
make: *** [debian/rules:4: binary] Error 25
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------

The above is just how the build ends and not necessarily the most relevant part.
If required, the full build log is available here:

https://people.debian.org/~sanvila/build-logs/202312/

About the archive rebuild: The build was made using virtual machines
from AWS, with enough memory, enough disk, and either one or two
CPUs, using a reduced chroot with only build-essential packages.

If you could not reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.

If this is really a bug in one of the build-depends, please use
reassign and affects, so that this is still visible in the BTS web
page for this package.

Thanks.


More information about the pkg-java-maintainers mailing list