Package: src:libjose4j-java Version: 0.7.12-2 Severity: serious Tags: ftbfs
Dear maintainer: During a rebuild of all packages in unstable, your package failed to build: -------------------------------------------------------------------------------- [...] debian/rules binary dh binary dh_update_autotools_config dh_autoreconf dh_auto_configure mh_patchpoms -plibjose4j-java --debian-build --keep-pom-version --maven-repo=/<<PKGBUILDDIR>>/debian/maven-repo dh_auto_build /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/<<PKGBUILDDIR>> -Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/<<PKGBUILDDIR>>/debian/maven.properties org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml -Ddebian.dir=/<<PKGBUILDDIR>>/debian -Dmaven.repo.local=/<<PKGBUILDDIR>>/debian/maven-repo --batch-mode package -DskipTests -Dnotimestamp=true -Dlocale=en_US OpenJDK 64-Bit Server VM warning: Options -Xverify:none and -noverify were deprecated in JDK 13 and will likely be removed in a future release. [0m[0m[INFO] Scanning for projects... [INFO] [INFO] ----------------------< org.bitbucket.b_c:jose4j >---------------------- [INFO] Building jose4j 0.7.12 [INFO] --------------------------------[ jar ]--------------------------------- [... snipped ...] at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.base/java.lang.reflect.Method.invoke(Method.java:568) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) 14:19:37.806 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: {"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}. {} org.jose4j.lang.JoseException: Missing required 'kty' parameter. at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228) at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220) at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238) at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51) at org.jose4j.jwk.JsonWebKeySetTest.testParseSetContainingInvalid(JsonWebKeySetTest.java:327) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.base/java.lang.reflect.Method.invoke(Method.java:568) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jwk.JsonWebKeySetTest [INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk, y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2, crv=P-521} [ERROR] Tests run: 6, Failures: 2, Errors: 0, Skipped: 0, Time elapsed: 0.063 s <<< FAILURE! - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest [ERROR] testParseExampleWithPrivate256(org.jose4j.jwk.EllipticCurveJsonWebKeyTest) Time elapsed: 0.031 s <<< FAILURE! java.lang.AssertionError: expected:<EC Private Key [8b:e2:14:0f:3a:17:e9:25:d1:ae:df:18:a3:b2:9a:fd:63:04:41:11] X: 7fcdce2770f6c45d4183cbee6fdb4b7b580733357be9ef13bacf6e3c7bd15445 Y: c7f144cd1bbd9b7e872cdfedb9eeb9f4b3695d6ea90b24ad8a4623288588e5ad
but was:<sun.security.ec.ECPrivateKeyImpl@f7754045>
at org.jose4j.jwk.EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate256(EllipticCurveJsonWebKeyTest.java:53) [ERROR] testParseExampleWithPrivate512(org.jose4j.jwk.EllipticCurveJsonWebKeyTest) Time elapsed: 0.029 s <<< FAILURE! java.lang.AssertionError: expected:<EC Private Key [37:fe:6d:9b:cb:45:df:bb:57:16:94:75:87:d7:e7:46:6d:c4:dc:c5] X: 1e929050f124fc6bc55c7d5393365df9def4ab0c22cb25798f934eb04e3c6bae3701a57a7910e9d81bf363159e8ebcb155d6349f4bdb6ccf8a94c5c59c7aac101a4 Y: 34a6440e376750d2371fd1bdc2c8f3b71d2f4ee5ea3432c815cca31560fe5d9387ec774b55838630e5cbbf5a8cbe0a91dd0064c6999a1f6e6e67faddede4c8c8f6
but was:<sun.security.ec.ECPrivateKeyImpl@44924e16>
at org.jose4j.jwk.EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate512(EllipticCurveJsonWebKeyTest.java:94) [INFO] Running org.jose4j.jwk.OctJwkGeneratorTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctJwkGeneratorTest [INFO] Running org.jose4j.jwk.X5cTest [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.X5cTest [INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest [INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.RsaJsonWebKeyTest [INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest [INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.DecryptionJwkSelectorTest [INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.182 s - in org.jose4j.jwk.RsaJwkGeneratorTest [INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest 14:19:38.084 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty": "EC", "kid": "this one shouldn't work 'cause there's no y", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "crv": "P-256" }, { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. {} org.jose4j.lang.JoseException: Missing required 'y' parameter. at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228) at org.jose4j.jwk.PublicJsonWebKey.getBigIntFromBase64UrlEncodedParam(PublicJsonWebKey.java:245) at org.jose4j.jwk.EllipticCurveJsonWebKey.<init>(EllipticCurveJsonWebKey.java:69) at org.jose4j.jwk.EllipticCurveJsonWebKey.<init>(EllipticCurveJsonWebKey.java:57) at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:245) at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51) at org.jose4j.jwk.JsonWebKeySetAnotherTest.oneBadApple(JsonWebKeySetAnotherTest.java:51) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.base/java.lang.reflect.Method.invoke(Method.java:568) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) 14:19:38.090 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: { "keys": [ { "kty": "EC", "kid": "96", "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg", "y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4", "crv": "P-256" }, { "kty": "EC", "kid": "a9", "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY", "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ", "crv": "P-256" }, { "kty":"UNKNOWN", "crv":"whatever", "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo" } { "kty": "EC", "kid": "2d", "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw", "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4", "crv": "P-256" } ]}. {} org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN' at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:249) at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51) at org.jose4j.jwk.JsonWebKeySetAnotherTest.oneUnknownKTY(JsonWebKeySetAnotherTest.java:91) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.base/java.lang.reflect.Method.invoke(Method.java:568) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s - in org.jose4j.jwk.JsonWebKeySetAnotherTest [INFO] Running org.jose4j.jwk.HttpsJwksTest [WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.002 s - in org.jose4j.jwk.HttpsJwksTest [INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest [INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s - in org.jose4j.jwk.Rfc7638JwkThumbprintTest [INFO] Running org.jose4j.jwk.ExtraJwkParametersTest [INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.ExtraJwkParametersTest [INFO] Running org.jose4j.jwk.EcJwkGeneratorTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwk.EcJwkGeneratorTest [INFO] Running org.jose4j.jwk.JsonWebKeyTest [INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s - in org.jose4j.jwk.JsonWebKeyTest [INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.OctetSequenceJsonWebKeyTest [INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest 14:19:38.142 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {alg=RSA, mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w, exp=AQAB, user=sig} and the full JWKS content: {"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}. {} org.jose4j.lang.JoseException: Missing required 'kty' parameter. at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228) at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220) at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238) at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51) at org.jose4j.jwk.VerificationJwkSelectorTest.noKidTestRyoItoJwksEndpoint(VerificationJwkSelectorTest.java:593) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.base/java.lang.reflect.Method.invoke(Method.java:568) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100) at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103) at org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63) at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331) at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79) at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329) at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66) at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293) at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306) at org.junit.runners.ParentRunner.run(ParentRunner.java:413) at org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365) at org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273) at org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238) at org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159) at org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384) at org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345) at org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126) at org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418) 14:19:38.170 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying signature: java.security.SignatureException: Signature length not correct: got 512 but was expecting 256 14:19:38.171 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying signature: java.security.SignatureException: Signature length not correct: got 256 but was expecting 512 [INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.038 s - in org.jose4j.jwk.VerificationJwkSelectorTest [INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwk.JwkGlitchesInDeploymentTest [INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest [INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest [INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s - in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest [INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test [INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s - in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test [INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0 LfkHot2nGTVlmfxbgxQfMg [INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest [INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest [INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.kdf.Pbkdf2MoreTest [INFO] Running org.jose4j.jwe.InvalidCurveTest 14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 26 mod 113 14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w 14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.JoseException: epk is invalid for P-256 14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key is equal to 2446 mod 2447 14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w 14:19:38.227 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as expected: org.jose4j.lang.JoseException: epk is invalid for P-256 [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.InvalidCurveTest [INFO] Running org.jose4j.jwe.NegativeJweKeyTest 14:19:38.230 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A128GCM content encryption algorithm (128). 14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. 14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. 14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. 14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. 14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. 14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. 14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. 14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. 14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 bits or larger MUST be used with the all JOSE RSA algorithms (given key was only 1024 bits). 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided. 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided. 14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 7736 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A128CBC-HS256, expected a 256 bit key but a 4688 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 7736 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A192CBC-HS384, expected a 384 bit key but a 4688 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided. 14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 7736 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with A256CBC-HS512, expected a 512 bit key but a 4688 bit key was provided. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.PublicKey 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.PrivateKey 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is to be used as the JWE Encrypted Key value when utilizing direct encryption but this JWE has 40 octets in the encrypted key part. 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.interfaces.ECPublicKey 14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.interfaces.ECPublicKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null. 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPrivateKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPrivateKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPrivateKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey to java.security.interfaces.ECPrivateKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to java.security.interfaces.ECPrivateKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl to java.security.interfaces.ECPrivateKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.interfaces.ECPrivateKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey to java.security.interfaces.ECPrivateKey 14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to java.security.PublicKey 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt (RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: java.security.InvalidKeyException: No installed provider supports this key: org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key java.lang.ClassCastException: Cannot cast org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to java.security.PublicKey 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 8 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 40 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 136 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 192 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected a 128 bit key but a 256 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an RSA key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A128KW, expected an AES key but an EC key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 8 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 40 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 128 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 184 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected a 192 bit key but a 256 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an RSA key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A192KW, expected an AES key but an EC key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 8 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 40 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 128 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 192 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 248 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected a 256 bit key but a 264 bit key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an RSA key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. 14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE A256KW, expected an AES key but an EC key was provided. [INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s - in org.jose4j.jwe.NegativeJweKeyTest [INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiR3k4cW44bHZicTY3d3dpbCJ9.o8IVuW9V6aEi6IeXbdtKfbptu4nPSNCK2TpEJAKyt4VVrlmJNdYbsQ.mSf3hJfjRI__E33JN_ZOLA.6CyLaFUTHa2jyp8xnFmDtw.Znr7LrCAdqpVe-_uS7CTZQ [INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.683 s - in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest [INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest [INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s - in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest [INFO] Running org.jose4j.jwe.GeneralJweTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.jwe.GeneralJweTest [INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest [WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.003 s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest [INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest [INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s - in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest [INFO] Running org.jose4j.jwe.CritHeaderTest 14:19:38.994 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as critical. [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.CritHeaderTest [INFO] Running org.jose4j.jwe.ZipTest eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..DmnUfeLCmXlD452XuQ2nGg.VX8u83sdRbSL5LVdZD8LfXYPnpBCjlu0iZkkOSBWpdn62Qy4w-FHToC8oBtKT2hF-TPpap0D47bwIYRDpsxL9g.FlrsXCg0nPW8j1kwJUvfcg eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..tb8Qom4QKLPTRz8SrMDsgg.77HGRRSIlWuKK1wghDSNpgkLYYbNT4pNNd2sQ3g-gOhPJj4zLKF8-ufqsxviBggBJAzC7xbTHYPgbtn9B2x5ZVqNmS6-H5V4mAf9sbiWHLjuw7SkB7A8JkiHM9u5YpmebFPpohPdbDMPSqXMzVWLNLXquaTLRlCQDX1zpAaZptxPo3n9VJtOqDJXBPn_JMJwpXnIGiZlEvDCeRDHzQFRH5zSV09O_K8amgDBfY_fVKthR_FS9KSGUf8qi4N-3yHjEmI91OoAqrtAV9raHStA8-ZZp7tZZyaGq-DeOmtQInmFWVwwWmxGIzzDsY3ungDyw2uvNuRZP4UINPTRKV-GYsa-AfoFxBciBzXxGxGQYTQxKVj9sB8laJEiSwpkzYBV.7togQFW_L2snM3HrgZ_YbQ [INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s - in org.jose4j.jwe.ZipTest [INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest [INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest 14:19:39.006 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: key unwrapping, algorithm from: SunJCE 14:19:39.015 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@4ad3d266 14:19:39.020 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@3533df16 14:19:39.024 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@15d0849 14:19:39.025 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): 256 bit AES key 14:19:39.026 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm from: SunJCE 14:19:39.072 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe80f7 [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.065 s - in org.jose4j.jwe.JweCryptoPrimitiveTest [INFO] Running org.jose4j.jwe.JsonWebEncryptionTest [INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s - in org.jose4j.jwe.JsonWebEncryptionTest [INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s - in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest [INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s - in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest [INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest [INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest 14:19:39.116 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiXzNlVHhENFJHdHFlaUo1Y2Z6LTdqWksxc3hwdV91bzJVb201QTFreTJfQSIsInkiOiJmODJwYXRzelFmZC1fSnZ2WXhVcVdpbEYxdXgyeHN6WWlUeWkyV3h6cF9nIiwiY3J2IjoiUC0yNTYifX0.-csTe0bWJRkYg95Glm7VrRI4fGYE2zP7_Dj--obsW-k77kzuX76DfA.s5KCZKtid9N-iOPFyDNZ3w.Y9-LL2goWcwohDTNBNkqHFgVXRXgLy6qh7rwycOri4EyJe9syl_y7AdlqIq4O7sEbjKpowuTtSPo5ntHtR3FMQ.Pe3Q3zKIKfEFrBTLOQ0p2Q 14:19:39.121 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiclZsNWZiVnlWa29vX0N6ZDdRQktINVl3RjAxelVISFk2NERHT2YtS0taWSIsInkiOiJpUkxIM1NSVG4wQmNEd3FOUExta2I4S1JzeGVIbDlnZzZpZTdpc3RWZm5NIiwiY3J2IjoiUC0yNTYifX0.rZ3Fpc5w3AFak3h8oy39ybGvuXXnd0t9FJy4G6P_sPIc3XJpa5ayV9Kp-WUiXMa0uAj4XwsAR4Q.J83ZleRV61sgM86ZAalkgQ.6nQ2fltrj3geYIcb-LHR9FtlUKCFnbHAHZoVOV-82HJnIH3d64Ya1jXmElTlCvAiaGhSFIoD2IBFYyPJlik7pg.4uvw_hGOLV4g9C2BUav8C47dpT0huC1L 14:19:39.126 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A256KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicFFTV1FHb2djMnNVWDMyZllJTmZKX0JwT0lyVDNaMWt2MU1VekhHZW1RayIsInkiOiJBTWJqdWtiTVNsYkxQRlVXS01WVXZYUHlVTmtiNnRCeHRKMHBLVm1hellZIiwiY3J2IjoiUC0yNTYifX0.8tk9OJomyqhANLFgUID0a9hSJy0g9Ln4nR1Sw84nB5TqRxxv2RzMmhEptI9XalIyrkfZAllz2cBM5OlgjSzsoXBXijQJgH67.2CMb5alcjTJqQnwPHMsDRw.XusR_5us3iPH4xfo67s0vyPSMXlX1HJyxdp8piVA85_C4YsVJbJWtMl1piTnSpv87_9viCIz0lVFGujy9wtduw.lmxDFAVwP6LhABIu-3uReOhPi6-8BISfd-qOeK9ASqI 14:19:39.130 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQ2IxdWlUS0UwNmMxb0oxcnZGeDJHV3FaSlJHV1htbDlzMmNpR1I5ajFFTSIsInkiOiJrbWNaVnBrWFhMUEhGRHVrTVJxR0hLMU04al9MY1VmbUE1R0lSaTdTRE9ZIiwiY3J2IjoiUC0yNTYifX0.jVwnetAsMUemLvb8rgd6UdFGJaZC8O_25h-tPwH8KhQDfLtXl-2jaQ.VdRkiP2boYiZ5mk-lTK1zA.0RTJjrijj47BBtI9TiMBpmJFXoyCVuWhgmad9R2rrHsThlnWo_H5NKGPYa76DtiLRp8xiMs-bml8drULdv5HNA.dwcB_qFgZeBnTG-stoNcHA 14:19:39.135 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiLTRvZjg3a2RpRXBBUElhZjd6WS0zVWRMX1JMUl8xdUpNV25SV3UzWENLTSIsInkiOiJRSllNWUc0LTlBWFBMdnlQb1JhelRNWnJtb0piOW1CLXItM29WZjdMUVE4IiwiY3J2IjoiUC0yNTYifX0.TTY_hdO0pKX15X4rP7ElsOKPidArqF0cIZvB2iA_a1VIOUr1WmvL_cbxV7-K7np97wBrhxUfaPo.F1TviHXbGCEXCqXPoy1gug.Duzf4eX_GV99_ToFB1eWgdfYca9xLnU6hZwV06FjI5oWePTCcxwhAIhX4nts1QJ9lRhDtfVWCv-Pwl5vvdsZVw.4Ppq_m-W7y7UMF59WN6OgaHImG6OEJ3N 14:19:39.140 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A192KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiblVjYVdmMWYtekJkVUQ0RFlWalBoVTQwbXYyajhYTWl2VWJhNWhkTXdCZyIsInkiOiI1a2hCZlFGVDFOcG9DQ1lPNUJaaG8tT2h1VTZTUTByZk94NnBhRTR0OXpjIiwiY3J2IjoiUC0yNTYifX0.8g2EViEz0o4RS3Sty1h81nnaEW5xjA0mPcQATQFAZ50Zfs4KndaopVcGmj4XH03g2fyAnTnLjreCnbflIqAmKLDKegdsnUMY.BdoZxwV2jk0XPBGlCXHGAQ.goQ4PODwq1C-MonhQBhpjFBtA0XakpXyHpQMSepGHY--Snvznm3v0ntT4EyKe77wRP-A-kbTEObjw-h98wEocg.LtSpcLUSWJIJVJrO3x-Hlgf40UeSnycmV86nJF2kYt8 14:19:39.145 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A128CBC-HS256: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUGRJNWM5QXVfMElvTzRmSkx2dTZpWTFlanBoZVMzcWdVWk13RmhBYlhoUSIsInkiOiIyNzNfU29uZHhyQV9rTUtwZnNIYUYwQUhLSE1NM0VGeTVwMU42MVEtTVVRIiwiY3J2IjoiUC0yNTYifX0.iASJx9JP40kO6AG4MUiUCn9HaV-74trsExuYTm1XfRqPP87dmv2gxQ.b_V4ks9RQ6LvcPXotjRyTA.5Qj_BPTOya0b1hd-1VfWUo_GxBdPHVHMK3P2hQEqpE6x-3rJV7WtG-4a1vEvtuDRkHd0fzIkMMVOibo69KnpaA.b_wX6mYSxKKleu3Umlh7Ug 14:19:39.150 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A192CBC-HS384: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiX05HSTFoYmFDRFdxNWYtTVhBczg0bEwyMWU2cVYxVjdtdDluQXFyZ0VRYyIsInkiOiJnMFMzQld3a21QV1ZwbVkzQzJ3N1FrUU93RmRIZjY4QUFySFBNek9VRVdFIiwiY3J2IjoiUC0yNTYifX0.w0hIi2jtRJ7XcLHK62aJkjpXaJykD4k_RHzX54xhGvNkMdHQuX76KviEAgz8_TtzYFHHx3SY06k.eTrXGRFcZarRRT14uWjloQ.c6LbF385mg9vzVMRy4Od9issIqyybItMEr4-rnBreqBuTKxiU8ISmVfnrgdV1Q2HaF9ZRyx9nhUvUHCzNWGFOQ.fY6dx4n8H4vomfwyZUfbBxOpSfCWBqnP 14:19:39.155 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ ECDH-ES+A128KW & A256CBC-HS512: eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZXFZR1BqWjg1RVNnVTQ1cVZrZThkOU9kMEZMUWs5ZEFidWtyR2R1Y1F3YyIsInkiOiJXaDZEUjZUSE1KN21TOVFrcVhKcWM2TkEtajA0NXVQX3ZoWDY1TWdGVFYwIiwiY3J2IjoiUC0yNTYifX0.aHeT8Ca34khE5Zl35VSV5x0njvxsj54eDdVMMH9z9Gbm-4x3ZBXMvo8XVx684ZZMZ-m9d6BQaz7_vrcxetBcAaIZ3dn6QRy_.qP6GlXisBbo_CmA8vwlfeA.EfjKaOVXvTtZBB5czomvXAeS0BOnF3jJeDdynzh3_dDyH08x5-tAzQuRnrh61LHu8uPkUAcz4Vmr3KyZdPT_Pw.hea2opsfyiUjE3YwNjNhx_eUs7JOylyk8TeOPKrzhUQ [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s - in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest [INFO] Running org.jose4j.jwe.NegativeJweWrappingTest 14:19:39.162 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error at java.base/sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:369); java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:282); java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... 14:19:39.162 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ 14:19:39.164 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error at java.base/sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:369); java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:282); java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... 14:19:39.164 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ 14:19:39.166 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error at java.base/sun.security.rsa.RSAPadding.unpadOAEP(RSAPadding.java:488); java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:284); java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... 14:19:39.166 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ 14:19:39.168 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. Substituting a randomly generated CEK and proceeding. java.security.InvalidKeyException: Unwrapping failed at java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error at java.base/sun.security.rsa.RSAPadding.unpadOAEP(RSAPadding.java:488); java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:284); java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130); ...omitted... 14:19:39.168 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ 14:19:39.170 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=FlleGhb7Jp-VlWS1wonqsA 14:19:39.171 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ 14:19:39.173 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content encryption key is not the correct size for the A192CBC-HS384 content encryption algorithm (384). eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.eqrzAN7XdUGevOenodfF_hhSx3GgiZ0icTaTHgqsilFOHc6gbdJPQXfsWUMl7YOqhj6fHsRWpicDs1iZrjynHJipqIN4hEYGF3cqEG1KjWRhZckfGtOym0JWYaoWxKC1oqI4XKtOSe_rMnymB67hDCjQ30k8Yc53o7uXvRB9-dMYZwrAKe0j2LFiqUOHA4UhUCHZiUNsSzLCVDVgBvxrolEySDhC8B4Tf7A8tQz3NFf-laCUupy2fQzd6vVGNl00271AGqm9a_CQtiIVvH7bGnMrWMtg47WB50C0xx0GnykbEa5uRRYORnA23I3SYHFKGH16og44TU98PfcfT6IZjQ.shk-LQhhBKJ7PKkKGinohg.gwPbcXRuPQkyGVf_YOisDbDfOD0E9e76ieD9yrfkpUq7yKOdsB1lWyzFjbMo3C_OO5mzRAp8E7-7KJbNmrnXlc98ENeV6po0nD3nFjQhsOM.d78UrgBln74CKtH8nT-9EQ [INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s - in org.jose4j.jwe.NegativeJweWrappingTest [INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest [INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest [INFO] Running org.jose4j.lang.MathsTest [INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s - in org.jose4j.lang.MathsTest [INFO] Running org.jose4j.lang.ByteUtilTest 14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for converting to bit length 14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for converting to bit length 14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for converting to bit length 14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for converting to bit length 14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for converting to bit length 14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for converting to bit length 14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting to bit length 14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for converting to bit length [INFO] Tests run: 30, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s - in org.jose4j.lang.ByteUtilTest [INFO] Running org.jose4j.lang.JsonHelpTest [INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in org.jose4j.lang.JsonHelpTest [INFO] Running org.jose4j.cookbook.JoseCookbookTest [INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.16 s - in org.jose4j.cookbook.JoseCookbookTest [INFO] [INFO] Results: [INFO] [ERROR] Failures: [ERROR] EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate256:53 expected:<EC Private Key [8b:e2:14:0f:3a:17:e9:25:d1:ae:df:18:a3:b2:9a:fd:63:04:41:11] X: 7fcdce2770f6c45d4183cbee6fdb4b7b580733357be9ef13bacf6e3c7bd15445 Y: c7f144cd1bbd9b7e872cdfedb9eeb9f4b3695d6ea90b24ad8a4623288588e5ad
but was:<sun.security.ec.ECPrivateKeyImpl@f7754045>
[ERROR] EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate512:94 expected:<EC Private Key [37:fe:6d:9b:cb:45:df:bb:57:16:94:75:87:d7:e7:46:6d:c4:dc:c5] X: 1e929050f124fc6bc55c7d5393365df9def4ab0c22cb25798f934eb04e3c6bae3701a57a7910e9d81bf363159e8ebcb155d6349f4bdb6ccf8a94c5c59c7aac101a4 Y: 34a6440e376750d2371fd1bdc2c8f3b71d2f4ee5ea3432c815cca31560fe5d9387ec774b55838630e5cbbf5a8cbe0a91dd0064c6999a1f6e6e67faddede4c8c8f6
but was:<sun.security.ec.ECPrivateKeyImpl@44924e16>
[ERROR] Errors: [ERROR] KeyPairUtilTest.ecPublicKeyEncoding:81 ยป InvalidKeySpec java.security.InvalidK... [INFO] [ERROR] Tests run: 575, Failures: 2, Errors: 1, Skipped: 3 [INFO] [INFO] ------------------------------------------------------------------------ [INFO] BUILD FAILURE [INFO] ------------------------------------------------------------------------ [INFO] Total time: 11.824 s [INFO] Finished at: 2023-12-10T14:19:41Z [INFO] ------------------------------------------------------------------------ [ERROR] Failed to execute goal org.apache.maven.plugins:maven-surefire-plugin:2.22.3:test (default-test) on project jose4j: There are test failures. [ERROR] [ERROR] Please refer to /<<PKGBUILDDIR>>/target/surefire-reports for the individual test results. [ERROR] Please refer to dump files (if any exist) [date].dump, [date]-jvmRun[N].dump and [date].dumpstream. [ERROR] -> [Help 1] [ERROR] [ERROR] To see the full stack trace of the errors, re-run Maven with the -e switch. [ERROR] Re-run Maven using the -X switch to enable full debug logging. [ERROR] [ERROR] For more information about the errors and possible solutions, please read the following articles: [ERROR] [Help 1] http://cwiki.apache.org/confluence/display/MAVEN/MojoFailureException [0m[0mdh_auto_test: error: /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar -Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/<<PKGBUILDDIR>> -Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/<<PKGBUILDDIR>>/debian/maven.properties org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml -Ddebian.dir=/<<PKGBUILDDIR>>/debian -Dmaven.repo.local=/<<PKGBUILDDIR>>/debian/maven-repo --batch-mode test returned exit code 1 make: *** [debian/rules:4: binary] Error 25 dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2 -------------------------------------------------------------------------------- The above is just how the build ends and not necessarily the most relevant part. If required, the full build log is available here: https://people.debian.org/~sanvila/build-logs/202312/ About the archive rebuild: The build was made using virtual machines from AWS, with enough memory, enough disk, and either one or two CPUs, using a reduced chroot with only build-essential packages. If you could not reproduce the bug please contact me privately, as I am willing to provide ssh access to a virtual machine where the bug is fully reproducible. If this is really a bug in one of the build-depends, please use reassign and affects, so that this is still visible in the BTS web page for this package. Thanks.