Package: src:libjose4j-java
Version: 0.7.12-2
Severity: serious
Tags: ftbfs

Dear maintainer:

During a rebuild of all packages in unstable, your package failed to build:

--------------------------------------------------------------------------------
[...]
 debian/rules binary
dh binary
   dh_update_autotools_config
   dh_autoreconf
   dh_auto_configure
        mh_patchpoms -plibjose4j-java --debian-build --keep-pom-version 
--maven-repo=/<<PKGBUILDDIR>>/debian/maven-repo
   dh_auto_build
        /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar 
-Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/<<PKGBUILDDIR>> 
-Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/<<PKGBUILDDIR>>/debian/maven.properties 
org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml 
-Ddebian.dir=/<<PKGBUILDDIR>>/debian -Dmaven.repo.local=/<<PKGBUILDDIR>>/debian/maven-repo --batch-mode 
package -DskipTests -Dnotimestamp=true -Dlocale=en_US
OpenJDK 64-Bit Server VM warning: Options -Xverify:none and -noverify were 
deprecated in JDK 13 and will likely be removed in a future release.
[INFO] Scanning for projects...
[INFO]
[INFO] ----------------------< org.bitbucket.b_c:jose4j >----------------------
[INFO] Building jose4j 0.7.12
[INFO] --------------------------------[ jar ]---------------------------------

[... snipped ...]

        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
14:19:37.806 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: 
{"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}.
 {}
org.jose4j.lang.JoseException: Missing required 'kty' parameter.
        at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228)
        at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220)
        at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238)
        at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
        at 
org.jose4j.jwk.JsonWebKeySetTest.testParseSetContainingInvalid(JsonWebKeySetTest.java:327)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s 
- in org.jose4j.jwk.JsonWebKeySetTest
[INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest
org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, 
x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk,
 
y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2,
 crv=P-521}
[ERROR] Tests run: 6, Failures: 2, Errors: 0, Skipped: 0, Time elapsed: 0.063 s 
<<< FAILURE! - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest
[ERROR] testParseExampleWithPrivate256(org.jose4j.jwk.EllipticCurveJsonWebKeyTest)  Time 
elapsed: 0.031 s  <<< FAILURE!
java.lang.AssertionError:
expected:<EC Private Key 
[8b:e2:14:0f:3a:17:e9:25:d1:ae:df:18:a3:b2:9a:fd:63:04:41:11]
            X: 7fcdce2770f6c45d4183cbee6fdb4b7b580733357be9ef13bacf6e3c7bd15445
            Y: c7f144cd1bbd9b7e872cdfedb9eeb9f4b3695d6ea90b24ad8a4623288588e5ad
but was:<sun.security.ec.ECPrivateKeyImpl@f7754045>
        at 
org.jose4j.jwk.EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate256(EllipticCurveJsonWebKeyTest.java:53)

[ERROR] testParseExampleWithPrivate512(org.jose4j.jwk.EllipticCurveJsonWebKeyTest)  Time 
elapsed: 0.029 s  <<< FAILURE!
java.lang.AssertionError:
expected:<EC Private Key 
[37:fe:6d:9b:cb:45:df:bb:57:16:94:75:87:d7:e7:46:6d:c4:dc:c5]
            X: 
1e929050f124fc6bc55c7d5393365df9def4ab0c22cb25798f934eb04e3c6bae3701a57a7910e9d81bf363159e8ebcb155d6349f4bdb6ccf8a94c5c59c7aac101a4
            Y: 
34a6440e376750d2371fd1bdc2c8f3b71d2f4ee5ea3432c815cca31560fe5d9387ec774b55838630e5cbbf5a8cbe0a91dd0064c6999a1f6e6e67faddede4c8c8f6
but was:<sun.security.ec.ECPrivateKeyImpl@44924e16>
        at 
org.jose4j.jwk.EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate512(EllipticCurveJsonWebKeyTest.java:94)

[INFO] Running org.jose4j.jwk.OctJwkGeneratorTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.OctJwkGeneratorTest
[INFO] Running org.jose4j.jwk.X5cTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.X5cTest
[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.RsaJsonWebKeyTest
[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.DecryptionJwkSelectorTest
[INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.182 s 
- in org.jose4j.jwk.RsaJwkGeneratorTest
[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest
14:19:38.084 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: {  "keys": [    {      "kty": "EC",      "kid": "96",      "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg",      
"y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "a9",      "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY",      "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ",      "crv": "P-256"    },    {      "kty": "EC",      "kid": 
"this one shouldn't work 'cause there's no y",      "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "2d",      "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw",      "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4",      "crv": "P-256"    }  ]}. {}
org.jose4j.lang.JoseException: Missing required 'y' parameter.
        at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228)
        at 
org.jose4j.jwk.PublicJsonWebKey.getBigIntFromBase64UrlEncodedParam(PublicJsonWebKey.java:245)
        at 
org.jose4j.jwk.EllipticCurveJsonWebKey.<init>(EllipticCurveJsonWebKey.java:69)
        at 
org.jose4j.jwk.EllipticCurveJsonWebKey.<init>(EllipticCurveJsonWebKey.java:57)
        at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:245)
        at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
        at 
org.jose4j.jwk.JsonWebKeySetAnotherTest.oneBadApple(JsonWebKeySetAnotherTest.java:51)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
14:19:38.090 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: {  "keys": [    {      "kty": "EC",      "kid": "96",      "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg",      "y": 
"y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "a9",      "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY",      "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ",      "crv": "P-256"    },   {     "kty":"UNKNOWN",     
"crv":"whatever",     "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo"   }    {      "kty": "EC",      "kid": "2d",      "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw",      "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4",      "crv": "P-256"    }  ]}. {}
org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'
        at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:249)
        at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
        at 
org.jose4j.jwk.JsonWebKeySetAnotherTest.oneUnknownKTY(JsonWebKeySetAnotherTest.java:91)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s 
- in org.jose4j.jwk.JsonWebKeySetAnotherTest
[INFO] Running org.jose4j.jwk.HttpsJwksTest
[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.002 
s - in org.jose4j.jwk.HttpsJwksTest
[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest
[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s 
- in org.jose4j.jwk.Rfc7638JwkThumbprintTest
[INFO] Running org.jose4j.jwk.ExtraJwkParametersTest
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.ExtraJwkParametersTest
[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s 
- in org.jose4j.jwk.EcJwkGeneratorTest
[INFO] Running org.jose4j.jwk.JsonWebKeyTest
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s 
- in org.jose4j.jwk.JsonWebKeyTest
[INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.OctetSequenceJsonWebKeyTest
[INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest
14:19:38.142 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {alg=RSA, 
mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w,
 exp=AQAB, user=sig} and the full JWKS content: 
{"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}.
 {}
org.jose4j.lang.JoseException: Missing required 'kty' parameter.
        at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228)
        at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220)
        at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238)
        at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
        at 
org.jose4j.jwk.VerificationJwkSelectorTest.noKidTestRyoItoJwksEndpoint(VerificationJwkSelectorTest.java:593)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
14:19:38.170 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying 
signature: java.security.SignatureException: Signature length not correct: got 
512 but was expecting 256
14:19:38.171 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying 
signature: java.security.SignatureException: Signature length not correct: got 
256 but was expecting 512
[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.038 s 
- in org.jose4j.jwk.VerificationJwkSelectorTest
[INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.JwkGlitchesInDeploymentTest
[INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest
[INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s 
- in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest
[INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s 
- in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test
[INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest
Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0
LfkHot2nGTVlmfxbgxQfMg
[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest
[INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest
[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwe.kdf.Pbkdf2MoreTest
[INFO] Running org.jose4j.jwe.InvalidCurveTest
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key 
is equal to 26 mod 113
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & 
A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as 
expected: org.jose4j.lang.JoseException: epk is invalid for P-256
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key 
is equal to 2446 mod 2447
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & 
A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w
14:19:38.227 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as 
expected: org.jose4j.lang.JoseException: epk is invalid for P-256
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.jwe.InvalidCurveTest
[INFO] Running org.jose4j.jwe.NegativeJweKeyTest
14:19:38.230 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption 
key is not the correct size for the A128GCM content encryption algorithm (128).
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 192 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 256 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 128 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 256 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 128 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 192 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 
bits or larger MUST be used with the all JOSE RSA algorithms (given key was 
only 1024 bits).
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 
bits or larger MUST be used with the all JOSE RSA algorithms (given key was 
only 1024 bits).
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 
bits or larger MUST be used with the all JOSE RSA algorithms (given key was 
only 1024 bits).
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 7736 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 4688 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 7736 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 4688 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 7736 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 4688 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.PublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.PrivateKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is 
to be used as the JWE Encrypted Key value when utilizing direct encryption but 
this JWE has 40 octets in the encrypted key part.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.PublicKey
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt 
(RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: 
java.security.InvalidKeyException: No installed provider supports this key: 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.PublicKey
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 8 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 40 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 136 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 192 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 256 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 8 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 40 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 128 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 184 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 256 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 8 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 40 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 128 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 192 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 248 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 264 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected an AES key but an EC key was provided.
[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s 
- in org.jose4j.jwe.NegativeJweKeyTest
[INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest
eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiR3k4cW44bHZicTY3d3dpbCJ9.o8IVuW9V6aEi6IeXbdtKfbptu4nPSNCK2TpEJAKyt4VVrlmJNdYbsQ.mSf3hJfjRI__E33JN_ZOLA.6CyLaFUTHa2jyp8xnFmDtw.Znr7LrCAdqpVe-_uS7CTZQ
[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.683 s 
- in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest
[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s 
- in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest
[INFO] Running org.jose4j.jwe.GeneralJweTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwe.GeneralJweTest
[INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest
[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.003 
s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest
[INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest
[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s 
- in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest
[INFO] Running org.jose4j.jwe.CritHeaderTest
14:19:38.994 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like 
this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as 
critical.
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.jwe.CritHeaderTest
[INFO] Running org.jose4j.jwe.ZipTest
eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..DmnUfeLCmXlD452XuQ2nGg.VX8u83sdRbSL5LVdZD8LfXYPnpBCjlu0iZkkOSBWpdn62Qy4w-FHToC8oBtKT2hF-TPpap0D47bwIYRDpsxL9g.FlrsXCg0nPW8j1kwJUvfcg
eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..tb8Qom4QKLPTRz8SrMDsgg.77HGRRSIlWuKK1wghDSNpgkLYYbNT4pNNd2sQ3g-gOhPJj4zLKF8-ufqsxviBggBJAzC7xbTHYPgbtn9B2x5ZVqNmS6-H5V4mAf9sbiWHLjuw7SkB7A8JkiHM9u5YpmebFPpohPdbDMPSqXMzVWLNLXquaTLRlCQDX1zpAaZptxPo3n9VJtOqDJXBPn_JMJwpXnIGiZlEvDCeRDHzQFRH5zSV09O_K8amgDBfY_fVKthR_FS9KSGUf8qi4N-3yHjEmI91OoAqrtAV9raHStA8-ZZp7tZZyaGq-DeOmtQInmFWVwwWmxGIzzDsY3ungDyw2uvNuRZP4UINPTRKV-GYsa-AfoFxBciBzXxGxGQYTQxKVj9sB8laJEiSwpkzYBV.7togQFW_L2snM3HrgZ_YbQ
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s 
- in org.jose4j.jwe.ZipTest
[INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s 
- in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest
[INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest
14:19:39.006 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: 
key unwrapping, algorithm from: SunJCE
14:19:39.015 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@4ad3d266
14:19:39.020 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@3533df16
14:19:39.024 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@15d0849
14:19:39.025 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKey(): 256 bit AES key
14:19:39.026 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm 
from: SunJCE
14:19:39.072 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe80f7
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.065 s 
- in org.jose4j.jwe.JweCryptoPrimitiveTest
[INFO] Running org.jose4j.jwe.JsonWebEncryptionTest
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s 
- in org.jose4j.jwe.JsonWebEncryptionTest
[INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s 
- in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest
[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s 
- in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest
[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest
[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest
14:19:39.116 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A256KW & A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiXzNlVHhENFJHdHFlaUo1Y2Z6LTdqWksxc3hwdV91bzJVb201QTFreTJfQSIsInkiOiJmODJwYXRzelFmZC1fSnZ2WXhVcVdpbEYxdXgyeHN6WWlUeWkyV3h6cF9nIiwiY3J2IjoiUC0yNTYifX0.-csTe0bWJRkYg95Glm7VrRI4fGYE2zP7_Dj--obsW-k77kzuX76DfA.s5KCZKtid9N-iOPFyDNZ3w.Y9-LL2goWcwohDTNBNkqHFgVXRXgLy6qh7rwycOri4EyJe9syl_y7AdlqIq4O7sEbjKpowuTtSPo5ntHtR3FMQ.Pe3Q3zKIKfEFrBTLOQ0p2Q
14:19:39.121 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A256KW & A192CBC-HS384: 
eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiclZsNWZiVnlWa29vX0N6ZDdRQktINVl3RjAxelVISFk2NERHT2YtS0taWSIsInkiOiJpUkxIM1NSVG4wQmNEd3FOUExta2I4S1JzeGVIbDlnZzZpZTdpc3RWZm5NIiwiY3J2IjoiUC0yNTYifX0.rZ3Fpc5w3AFak3h8oy39ybGvuXXnd0t9FJy4G6P_sPIc3XJpa5ayV9Kp-WUiXMa0uAj4XwsAR4Q.J83ZleRV61sgM86ZAalkgQ.6nQ2fltrj3geYIcb-LHR9FtlUKCFnbHAHZoVOV-82HJnIH3d64Ya1jXmElTlCvAiaGhSFIoD2IBFYyPJlik7pg.4uvw_hGOLV4g9C2BUav8C47dpT0huC1L
14:19:39.126 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A256KW & A256CBC-HS512: 
eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicFFTV1FHb2djMnNVWDMyZllJTmZKX0JwT0lyVDNaMWt2MU1VekhHZW1RayIsInkiOiJBTWJqdWtiTVNsYkxQRlVXS01WVXZYUHlVTmtiNnRCeHRKMHBLVm1hellZIiwiY3J2IjoiUC0yNTYifX0.8tk9OJomyqhANLFgUID0a9hSJy0g9Ln4nR1Sw84nB5TqRxxv2RzMmhEptI9XalIyrkfZAllz2cBM5OlgjSzsoXBXijQJgH67.2CMb5alcjTJqQnwPHMsDRw.XusR_5us3iPH4xfo67s0vyPSMXlX1HJyxdp8piVA85_C4YsVJbJWtMl1piTnSpv87_9viCIz0lVFGujy9wtduw.lmxDFAVwP6LhABIu-3uReOhPi6-8BISfd-qOeK9ASqI
14:19:39.130 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A192KW & A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQ2IxdWlUS0UwNmMxb0oxcnZGeDJHV3FaSlJHV1htbDlzMmNpR1I5ajFFTSIsInkiOiJrbWNaVnBrWFhMUEhGRHVrTVJxR0hLMU04al9MY1VmbUE1R0lSaTdTRE9ZIiwiY3J2IjoiUC0yNTYifX0.jVwnetAsMUemLvb8rgd6UdFGJaZC8O_25h-tPwH8KhQDfLtXl-2jaQ.VdRkiP2boYiZ5mk-lTK1zA.0RTJjrijj47BBtI9TiMBpmJFXoyCVuWhgmad9R2rrHsThlnWo_H5NKGPYa76DtiLRp8xiMs-bml8drULdv5HNA.dwcB_qFgZeBnTG-stoNcHA
14:19:39.135 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A192KW & A192CBC-HS384: 
eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiLTRvZjg3a2RpRXBBUElhZjd6WS0zVWRMX1JMUl8xdUpNV25SV3UzWENLTSIsInkiOiJRSllNWUc0LTlBWFBMdnlQb1JhelRNWnJtb0piOW1CLXItM29WZjdMUVE4IiwiY3J2IjoiUC0yNTYifX0.TTY_hdO0pKX15X4rP7ElsOKPidArqF0cIZvB2iA_a1VIOUr1WmvL_cbxV7-K7np97wBrhxUfaPo.F1TviHXbGCEXCqXPoy1gug.Duzf4eX_GV99_ToFB1eWgdfYca9xLnU6hZwV06FjI5oWePTCcxwhAIhX4nts1QJ9lRhDtfVWCv-Pwl5vvdsZVw.4Ppq_m-W7y7UMF59WN6OgaHImG6OEJ3N
14:19:39.140 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A192KW & A256CBC-HS512: 
eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiblVjYVdmMWYtekJkVUQ0RFlWalBoVTQwbXYyajhYTWl2VWJhNWhkTXdCZyIsInkiOiI1a2hCZlFGVDFOcG9DQ1lPNUJaaG8tT2h1VTZTUTByZk94NnBhRTR0OXpjIiwiY3J2IjoiUC0yNTYifX0.8g2EViEz0o4RS3Sty1h81nnaEW5xjA0mPcQATQFAZ50Zfs4KndaopVcGmj4XH03g2fyAnTnLjreCnbflIqAmKLDKegdsnUMY.BdoZxwV2jk0XPBGlCXHGAQ.goQ4PODwq1C-MonhQBhpjFBtA0XakpXyHpQMSepGHY--Snvznm3v0ntT4EyKe77wRP-A-kbTEObjw-h98wEocg.LtSpcLUSWJIJVJrO3x-Hlgf40UeSnycmV86nJF2kYt8
14:19:39.145 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A128KW & A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUGRJNWM5QXVfMElvTzRmSkx2dTZpWTFlanBoZVMzcWdVWk13RmhBYlhoUSIsInkiOiIyNzNfU29uZHhyQV9rTUtwZnNIYUYwQUhLSE1NM0VGeTVwMU42MVEtTVVRIiwiY3J2IjoiUC0yNTYifX0.iASJx9JP40kO6AG4MUiUCn9HaV-74trsExuYTm1XfRqPP87dmv2gxQ.b_V4ks9RQ6LvcPXotjRyTA.5Qj_BPTOya0b1hd-1VfWUo_GxBdPHVHMK3P2hQEqpE6x-3rJV7WtG-4a1vEvtuDRkHd0fzIkMMVOibo69KnpaA.b_wX6mYSxKKleu3Umlh7Ug
14:19:39.150 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A128KW & A192CBC-HS384: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiX05HSTFoYmFDRFdxNWYtTVhBczg0bEwyMWU2cVYxVjdtdDluQXFyZ0VRYyIsInkiOiJnMFMzQld3a21QV1ZwbVkzQzJ3N1FrUU93RmRIZjY4QUFySFBNek9VRVdFIiwiY3J2IjoiUC0yNTYifX0.w0hIi2jtRJ7XcLHK62aJkjpXaJykD4k_RHzX54xhGvNkMdHQuX76KviEAgz8_TtzYFHHx3SY06k.eTrXGRFcZarRRT14uWjloQ.c6LbF385mg9vzVMRy4Od9issIqyybItMEr4-rnBreqBuTKxiU8ISmVfnrgdV1Q2HaF9ZRyx9nhUvUHCzNWGFOQ.fY6dx4n8H4vomfwyZUfbBxOpSfCWBqnP
14:19:39.155 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A128KW & A256CBC-HS512: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZXFZR1BqWjg1RVNnVTQ1cVZrZThkOU9kMEZMUWs5ZEFidWtyR2R1Y1F3YyIsInkiOiJXaDZEUjZUSE1KN21TOVFrcVhKcWM2TkEtajA0NXVQX3ZoWDY1TWdGVFYwIiwiY3J2IjoiUC0yNTYifX0.aHeT8Ca34khE5Zl35VSV5x0njvxsj54eDdVMMH9z9Gbm-4x3ZBXMvo8XVx684ZZMZ-m9d6BQaz7_vrcxetBcAaIZ3dn6QRy_.qP6GlXisBbo_CmA8vwlfeA.EfjKaOVXvTtZBB5czomvXAeS0BOnF3jJeDdynzh3_dDyH08x5-tAzQuRnrh61LHu8uPkUAcz4Vmr3KyZdPT_Pw.hea2opsfyiUjE3YwNjNhx_eUs7JOylyk8TeOPKrzhUQ
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s 
- in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest
[INFO] Running org.jose4j.jwe.NegativeJweWrappingTest
14:19:39.162 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. 
Substituting a randomly generated CEK and proceeding. 
java.security.InvalidKeyException: Unwrapping failed at 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error 
at java.base/sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:369); 
java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:282); 
java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...
14:19:39.162 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.164 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. 
Substituting a randomly generated CEK and proceeding. 
java.security.InvalidKeyException: Unwrapping failed at 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error 
at java.base/sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:369); 
java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:282); 
java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...
14:19:39.164 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.166 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. 
Substituting a randomly generated CEK and proceeding. 
java.security.InvalidKeyException: Unwrapping failed at 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error 
at java.base/sun.security.rsa.RSAPadding.unpadOAEP(RSAPadding.java:488); 
java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:284); 
java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...
14:19:39.166 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.168 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. 
Substituting a randomly generated CEK and proceeding. 
java.security.InvalidKeyException: Unwrapping failed at 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error 
at java.base/sun.security.rsa.RSAPadding.unpadOAEP(RSAPadding.java:488); 
java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:284); 
java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...
14:19:39.168 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.170 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=FlleGhb7Jp-VlWS1wonqsA
14:19:39.171 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.173 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content 
encryption key is not the correct size for the A192CBC-HS384 content encryption 
algorithm (384).
eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.eqrzAN7XdUGevOenodfF_hhSx3GgiZ0icTaTHgqsilFOHc6gbdJPQXfsWUMl7YOqhj6fHsRWpicDs1iZrjynHJipqIN4hEYGF3cqEG1KjWRhZckfGtOym0JWYaoWxKC1oqI4XKtOSe_rMnymB67hDCjQ30k8Yc53o7uXvRB9-dMYZwrAKe0j2LFiqUOHA4UhUCHZiUNsSzLCVDVgBvxrolEySDhC8B4Tf7A8tQz3NFf-laCUupy2fQzd6vVGNl00271AGqm9a_CQtiIVvH7bGnMrWMtg47WB50C0xx0GnykbEa5uRRYORnA23I3SYHFKGH16og44TU98PfcfT6IZjQ.shk-LQhhBKJ7PKkKGinohg.gwPbcXRuPQkyGVf_YOisDbDfOD0E9e76ieD9yrfkpUq7yKOdsB1lWyzFjbMo3C_OO5mzRAp8E7-7KJbNmrnXlc98ENeV6po0nD3nFjQhsOM.d78UrgBln74CKtH8nT-9EQ
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s 
- in org.jose4j.jwe.NegativeJweWrappingTest
[INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest
[INFO] Running org.jose4j.lang.MathsTest
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.lang.MathsTest
[INFO] Running org.jose4j.lang.ByteUtilTest
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting 
to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for 
converting to bit length
[INFO] Tests run: 30, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s 
- in org.jose4j.lang.ByteUtilTest
[INFO] Running org.jose4j.lang.JsonHelpTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.lang.JsonHelpTest
[INFO] Running org.jose4j.cookbook.JoseCookbookTest
[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.16 s 
- in org.jose4j.cookbook.JoseCookbookTest
[INFO]
[INFO] Results:
[INFO]
[ERROR] Failures:
[ERROR]   EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate256:53 
expected:<EC Private Key 
[8b:e2:14:0f:3a:17:e9:25:d1:ae:df:18:a3:b2:9a:fd:63:04:41:11]
            X: 7fcdce2770f6c45d4183cbee6fdb4b7b580733357be9ef13bacf6e3c7bd15445
            Y: c7f144cd1bbd9b7e872cdfedb9eeb9f4b3695d6ea90b24ad8a4623288588e5ad
but was:<sun.security.ec.ECPrivateKeyImpl@f7754045>
[ERROR]   EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate512:94 
expected:<EC Private Key 
[37:fe:6d:9b:cb:45:df:bb:57:16:94:75:87:d7:e7:46:6d:c4:dc:c5]
            X: 
1e929050f124fc6bc55c7d5393365df9def4ab0c22cb25798f934eb04e3c6bae3701a57a7910e9d81bf363159e8ebcb155d6349f4bdb6ccf8a94c5c59c7aac101a4
            Y: 
34a6440e376750d2371fd1bdc2c8f3b71d2f4ee5ea3432c815cca31560fe5d9387ec774b55838630e5cbbf5a8cbe0a91dd0064c6999a1f6e6e67faddede4c8c8f6
but was:<sun.security.ec.ECPrivateKeyImpl@44924e16>
[ERROR] Errors:
[ERROR]   KeyPairUtilTest.ecPublicKeyEncoding:81 ยป InvalidKeySpec 
java.security.InvalidK...
[INFO]
[ERROR] Tests run: 575, Failures: 2, Errors: 1, Skipped: 3
[INFO]
[INFO] ------------------------------------------------------------------------
[INFO] BUILD FAILURE
[INFO] ------------------------------------------------------------------------
[INFO] Total time:  11.824 s
[INFO] Finished at: 2023-12-10T14:19:41Z
[INFO] ------------------------------------------------------------------------
[ERROR] Failed to execute goal 
org.apache.maven.plugins:maven-surefire-plugin:2.22.3:test (default-test) on 
project jose4j: There are test failures.
[ERROR]
[ERROR] Please refer to /<<PKGBUILDDIR>>/target/surefire-reports for the 
individual test results.
[ERROR] Please refer to dump files (if any exist) [date].dump, 
[date]-jvmRun[N].dump and [date].dumpstream.
[ERROR] -> [Help 1]
[ERROR]
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e 
switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR]
[ERROR] For more information about the errors and possible solutions, please 
read the following articles:
[ERROR] [Help 1] 
http://cwiki.apache.org/confluence/display/MAVEN/MojoFailureException
dh_auto_test: error: /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar 
-Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/<<PKGBUILDDIR>> 
-Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/<<PKGBUILDDIR>>/debian/maven.properties 
org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml 
-Ddebian.dir=/<<PKGBUILDDIR>>/debian -Dmaven.repo.local=/<<PKGBUILDDIR>>/debian/maven-repo --batch-mode 
test returned exit code 1
make: *** [debian/rules:4: binary] Error 25
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------

The above is just how the build ends and not necessarily the most relevant part.
If required, the full build log is available here:

https://people.debian.org/~sanvila/build-logs/202312/

About the archive rebuild: The build was made using virtual machines
from AWS, with enough memory, enough disk, and either one or two
CPUs, using a reduced chroot with only build-essential packages.

If you could not reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.

If this is really a bug in one of the build-depends, please use
reassign and affects, so that this is still visible in the BTS web
page for this package.

Thanks.

Reply via email to