Your message dated Sun, 24 Mar 2024 21:58:14 +0100
with message-id <[email protected]>
and subject line Re: Bug#1057933: libjose4j-java: FTBFS: IOException: Only 
named ECParameters supported
has caused the Debian Bug report #1057933,
regarding libjose4j-java: FTBFS: IOException: Only named ECParameters supported
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1057933: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057933
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: src:libjose4j-java
Version: 0.7.12-2
Severity: serious
Tags: ftbfs

Dear maintainer:

During a rebuild of all packages in unstable, your package failed to build:

--------------------------------------------------------------------------------
[...]
 debian/rules binary
dh binary
   dh_update_autotools_config
   dh_autoreconf
   dh_auto_configure
        mh_patchpoms -plibjose4j-java --debian-build --keep-pom-version 
--maven-repo=/<<PKGBUILDDIR>>/debian/maven-repo
   dh_auto_build
        /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar 
-Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/<<PKGBUILDDIR>> 
-Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/<<PKGBUILDDIR>>/debian/maven.properties 
org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml 
-Ddebian.dir=/<<PKGBUILDDIR>>/debian -Dmaven.repo.local=/<<PKGBUILDDIR>>/debian/maven-repo --batch-mode 
package -DskipTests -Dnotimestamp=true -Dlocale=en_US
OpenJDK 64-Bit Server VM warning: Options -Xverify:none and -noverify were 
deprecated in JDK 13 and will likely be removed in a future release.
[INFO] Scanning for projects...
[INFO]
[INFO] ----------------------< org.bitbucket.b_c:jose4j >----------------------
[INFO] Building jose4j 0.7.12
[INFO] --------------------------------[ jar ]---------------------------------

[... snipped ...]

        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
14:19:37.806 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=null, x=riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM, y=izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA, crv=P-256} and the full JWKS content: 
{"keys":[{"kty":"EC","x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":false,"x":"GS2tEeCRf0CFHzI_y68XiLzqa9-RpG4Xn-dq2lPtShY","y":"Rq6ybA7IbjhDTfvP2GSzxEql8II7RvRPb3mJ6tzZUgI","crv":"P-256"},{"kty":"EC","x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":["IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","huh"],"y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":"EC","x":"rO8MozDmEAVZ0B5zQUDD8PGosFlwmoMmi7I-1rspWz4","y":"I6ku1iUzFJgTnjNzjAC1sSGkYfiDqs-eEReFMLI-6n8","crv":"P-256"}{"kty":1,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":885584955514411149933357445595595145885566661,"x":"IiIIM4W-HDen_11XiGlFXh1kOxKcX1YB5gqMrCM-hMM","y":"57-3xqdddSBBarwwXcWu4hIG4dAlIiEYdy4aaFGb57s","crv":"P-256"},{"kty":{"EC":"EC"},"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},{"kty":null,"x":"riwTtQeRjmlDsR4PUQELhejpPkZkQstb0_Lf08qeBzM","y":"izN8y6z-8j8bB_Lj10gX9mnaE_E0ZK5fl0hJVyLWMKA","crv":"P-256"},]}.
 {}
org.jose4j.lang.JoseException: Missing required 'kty' parameter.
        at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228)
        at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220)
        at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238)
        at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
        at 
org.jose4j.jwk.JsonWebKeySetTest.testParseSetContainingInvalid(JsonWebKeySetTest.java:327)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s 
- in org.jose4j.jwk.JsonWebKeySetTest
[INFO] Running org.jose4j.jwk.EllipticCurveJsonWebKeyTest
org.jose4j.jwk.EllipticCurveJsonWebKey{kty=EC, 
x=AekpBQ8ST8a8VcfVOTNl353vSrDCLLJXmPk06wTjxrrjcBpXp5EOnYG_NjFZ6OvLFV1jSfS9tsz4qUxcWceqwQGk,
 
y=ADSmRA43Z1DSNx_RvcLI87cdL07l6jQyyBXMoxVg_l2Th-x3S1WDhjDly79ajL4Kkd0AZMaZmh9ubmf63e3kyMj2,
 crv=P-521}
[ERROR] Tests run: 6, Failures: 2, Errors: 0, Skipped: 0, Time elapsed: 0.063 s 
<<< FAILURE! - in org.jose4j.jwk.EllipticCurveJsonWebKeyTest
[ERROR] testParseExampleWithPrivate256(org.jose4j.jwk.EllipticCurveJsonWebKeyTest)  Time 
elapsed: 0.031 s  <<< FAILURE!
java.lang.AssertionError:
expected:<EC Private Key 
[8b:e2:14:0f:3a:17:e9:25:d1:ae:df:18:a3:b2:9a:fd:63:04:41:11]
            X: 7fcdce2770f6c45d4183cbee6fdb4b7b580733357be9ef13bacf6e3c7bd15445
            Y: c7f144cd1bbd9b7e872cdfedb9eeb9f4b3695d6ea90b24ad8a4623288588e5ad
but was:<sun.security.ec.ECPrivateKeyImpl@f7754045>
        at 
org.jose4j.jwk.EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate256(EllipticCurveJsonWebKeyTest.java:53)

[ERROR] testParseExampleWithPrivate512(org.jose4j.jwk.EllipticCurveJsonWebKeyTest)  Time 
elapsed: 0.029 s  <<< FAILURE!
java.lang.AssertionError:
expected:<EC Private Key 
[37:fe:6d:9b:cb:45:df:bb:57:16:94:75:87:d7:e7:46:6d:c4:dc:c5]
            X: 
1e929050f124fc6bc55c7d5393365df9def4ab0c22cb25798f934eb04e3c6bae3701a57a7910e9d81bf363159e8ebcb155d6349f4bdb6ccf8a94c5c59c7aac101a4
            Y: 
34a6440e376750d2371fd1bdc2c8f3b71d2f4ee5ea3432c815cca31560fe5d9387ec774b55838630e5cbbf5a8cbe0a91dd0064c6999a1f6e6e67faddede4c8c8f6
but was:<sun.security.ec.ECPrivateKeyImpl@44924e16>
        at 
org.jose4j.jwk.EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate512(EllipticCurveJsonWebKeyTest.java:94)

[INFO] Running org.jose4j.jwk.OctJwkGeneratorTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.OctJwkGeneratorTest
[INFO] Running org.jose4j.jwk.X5cTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.X5cTest
[INFO] Running org.jose4j.jwk.RsaJsonWebKeyTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.RsaJsonWebKeyTest
[INFO] Running org.jose4j.jwk.DecryptionJwkSelectorTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.DecryptionJwkSelectorTest
[INFO] Running org.jose4j.jwk.RsaJwkGeneratorTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.182 s 
- in org.jose4j.jwk.RsaJwkGeneratorTest
[INFO] Running org.jose4j.jwk.JsonWebKeySetAnotherTest
14:19:38.084 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=EC, kid=this one shouldn't work 'cause there's no y, x=msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY, crv=P-256} and the full JWKS content: {  "keys": [    {      "kty": "EC",      "kid": "96",      "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg",      
"y": "y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "a9",      "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY",      "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ",      "crv": "P-256"    },    {      "kty": "EC",      "kid": 
"this one shouldn't work 'cause there's no y",      "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "2d",      "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw",      "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4",      "crv": "P-256"    }  ]}. {}
org.jose4j.lang.JoseException: Missing required 'y' parameter.
        at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228)
        at 
org.jose4j.jwk.PublicJsonWebKey.getBigIntFromBase64UrlEncodedParam(PublicJsonWebKey.java:245)
        at 
org.jose4j.jwk.EllipticCurveJsonWebKey.<init>(EllipticCurveJsonWebKey.java:69)
        at 
org.jose4j.jwk.EllipticCurveJsonWebKey.<init>(EllipticCurveJsonWebKey.java:57)
        at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:245)
        at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
        at 
org.jose4j.jwk.JsonWebKeySetAnotherTest.oneBadApple(JsonWebKeySetAnotherTest.java:51)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
14:19:38.090 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {kty=UNKNOWN, crv=whatever, x=11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo} and the full JWKS content: {  "keys": [    {      "kty": "EC",      "kid": "96",      "x": "bfOKLR8w_vD7ce9o_hmxfqTcNo9joJIALo4xC_-Qhzg",      "y": 
"y2jXZtCaeoLGQIiJx5-kHLT3SlP7nzQbnP8SLUl1vg4",      "crv": "P-256"    },    {      "kty": "EC",      "kid": "a9",      "x": "msdBj_jUyuw_qCkNXTGjGpibVc_FE5FaexmE_qTWKmY",      "y": "lDHAX8xJ17zRDtPcPzQmFurVtOJllmOK2jPwCGZ57TQ",      "crv": "P-256"    },   {     "kty":"UNKNOWN",     
"crv":"whatever",     "x":"11qYAYKxCrfVS_7TyWQHOg7hcvPapiMlrwIaaPcHURo"   }    {      "kty": "EC",      "kid": "2d",      "x": "l3V6TH8tuS0vWSpZ9KcUW4oDuBzOTN0v2C_dsqkrHKw",      "y": "Yhg6pR__nALI6sp68NcQM6FlPaod83xUXgHKGOCJHJ4",      "crv": "P-256"    }  ]}. {}
org.jose4j.lang.JoseException: Unknown key type algorithm: 'UNKNOWN'
        at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:249)
        at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
        at 
org.jose4j.jwk.JsonWebKeySetAnotherTest.oneUnknownKTY(JsonWebKeySetAnotherTest.java:91)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.008 s 
- in org.jose4j.jwk.JsonWebKeySetAnotherTest
[INFO] Running org.jose4j.jwk.HttpsJwksTest
[WARNING] Tests run: 3, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.002 
s - in org.jose4j.jwk.HttpsJwksTest
[INFO] Running org.jose4j.jwk.Rfc7638JwkThumbprintTest
[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.005 s 
- in org.jose4j.jwk.Rfc7638JwkThumbprintTest
[INFO] Running org.jose4j.jwk.ExtraJwkParametersTest
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.ExtraJwkParametersTest
[INFO] Running org.jose4j.jwk.EcJwkGeneratorTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s 
- in org.jose4j.jwk.EcJwkGeneratorTest
[INFO] Running org.jose4j.jwk.JsonWebKeyTest
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.006 s 
- in org.jose4j.jwk.JsonWebKeyTest
[INFO] Running org.jose4j.jwk.OctetSequenceJsonWebKeyTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.OctetSequenceJsonWebKeyTest
[INFO] Running org.jose4j.jwk.VerificationJwkSelectorTest
14:19:38.142 DEBUG org.jose4j.jwk.JsonWebKeySet - Ignoring an individual JWK in a JWKS due to a problem processing it. JWK params: {alg=RSA, 
mod=4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w,
 exp=AQAB, user=sig} and the full JWKS content: 
{"keys":[{"alg":"RSA","mod":"4ZLcBYTH4S3b80iEkDKTAmLvNM3XkqgdQoLPtNgNoilmHD1wian5_EDl2IvwAJRug9I0TnhVuMZW3ylhsPxus3Iu70nCQbOdsoBCobNzm6RaLUsz6LjRa2mvLMHeG1CP5rGWiv5GwBU8DNuUf_uPWXMe9K3i3E27nm4NnwDcOMPETpr6PLB2h4iXsHrKGLIFPdoPx_TIcrbj7RR9vWtrkj1pHt2OnJy5cFmXXRc77SZw0qRouVD0cqiS0XPHTaoFgmFr1x7NdbENxMJZJ-VPaIqN0ht2tFX5oOCClhNjBTKc2U-c-b32ETtUnNUu1kHafS-V0qsobmy-Cq_gyyQY2w","exp":"AQAB","user":"sig"}]}.
 {}
org.jose4j.lang.JoseException: Missing required 'kty' parameter.
        at org.jose4j.jwk.JsonWebKey.getString(JsonWebKey.java:228)
        at org.jose4j.jwk.JsonWebKey.getStringRequired(JsonWebKey.java:220)
        at org.jose4j.jwk.JsonWebKey$Factory.newJwk(JsonWebKey.java:238)
        at org.jose4j.jwk.JsonWebKeySet.<init>(JsonWebKeySet.java:51)
        at 
org.jose4j.jwk.VerificationJwkSelectorTest.noKidTestRyoItoJwksEndpoint(VerificationJwkSelectorTest.java:593)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:77)
        at 
java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.base/java.lang.reflect.Method.invoke(Method.java:568)
        at 
org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59)
        at 
org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12)
        at 
org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:61)
        at 
org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at 
org.junit.runners.BlockJUnit4ClassRunner$1.evaluate(BlockJUnit4ClassRunner.java:100)
        at org.junit.runners.ParentRunner.runLeaf(ParentRunner.java:366)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:103)
        at 
org.junit.runners.BlockJUnit4ClassRunner.runChild(BlockJUnit4ClassRunner.java:63)
        at org.junit.runners.ParentRunner$4.run(ParentRunner.java:331)
        at org.junit.runners.ParentRunner$1.schedule(ParentRunner.java:79)
        at org.junit.runners.ParentRunner.runChildren(ParentRunner.java:329)
        at org.junit.runners.ParentRunner.access$100(ParentRunner.java:66)
        at org.junit.runners.ParentRunner$2.evaluate(ParentRunner.java:293)
        at org.junit.runners.ParentRunner$3.evaluate(ParentRunner.java:306)
        at org.junit.runners.ParentRunner.run(ParentRunner.java:413)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.execute(JUnit4Provider.java:365)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeWithRerun(JUnit4Provider.java:273)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.executeTestSet(JUnit4Provider.java:238)
        at 
org.apache.maven.surefire.junit4.JUnit4Provider.invoke(JUnit4Provider.java:159)
        at 
org.apache.maven.surefire.booter.ForkedBooter.invokeProviderInSameClassLoader(ForkedBooter.java:384)
        at 
org.apache.maven.surefire.booter.ForkedBooter.runSuitesInProcess(ForkedBooter.java:345)
        at 
org.apache.maven.surefire.booter.ForkedBooter.execute(ForkedBooter.java:126)
        at 
org.apache.maven.surefire.booter.ForkedBooter.main(ForkedBooter.java:418)
14:19:38.170 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying 
signature: java.security.SignatureException: Signature length not correct: got 
512 but was expecting 256
14:19:38.171 DEBUG o.j.j.RsaUsingShaAlgorithm$RsaSha512 - Problem verifying 
signature: java.security.SignatureException: Signature length not correct: got 
256 but was expecting 512
[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.038 s 
- in org.jose4j.jwk.VerificationJwkSelectorTest
[INFO] Running org.jose4j.jwk.JwkGlitchesInDeploymentTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwk.JwkGlitchesInDeploymentTest
[INFO] Running org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.jwe.kdf.Pbkdf2JwkExampleTest
[INFO] Running org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.018 s 
- in org.jose4j.jwe.kdf.Rfc6070Pbkdf2TestVectorsTest
[INFO] Running org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.013 s 
- in org.jose4j.jwe.kdf.Pbkdf2CompareToJavaSecretKeyFactorySha1Test
[INFO] Running org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest
Sq8rGLm4rEtzScmnSsY5r1n-AqBl_iBU8FxN80Uc0S0
LfkHot2nGTVlmfxbgxQfMg
[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwe.kdf.ConcatKeyDerivationFunctionTest
[INFO] Running org.jose4j.jwe.kdf.Pbkdf2MoreTest
[INFO] Tests run: 6, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwe.kdf.Pbkdf2MoreTest
[INFO] Running org.jose4j.jwe.InvalidCurveTest
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key 
is equal to 26 mod 113
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & 
A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as 
expected: org.jose4j.lang.JoseException: epk is invalid for P-256
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - The receiver private key 
is equal to 2446 mod 2447
14:19:38.226 DEBUG org.jose4j.jwe.InvalidCurveTest - JWE w/ ECDH-ES+A128KW & 
A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZ1RsaTY1ZVRRN3otQmgxNDdmZjhLM203azJVaURpRzJMcFlrV0FhRkpDYyIsInkiOiJjTEFuakthNGJ6akQ3REpWUHdhOUVQclJ6TUc3ck9OZ3NpVUQta2YzMEZzIiwiY3J2IjoiUC0yNTYifX0.qGAdxtEnrV_3zbIxU2ZKrMWcejNltjA_dtefBFnRh9A2z9cNIqYRWg.pEA5kX304PMCOmFSKX_cEg.a9fwUrx2JXi1OnWEMOmZhXd94-bEGCH9xxRwqcGuG2AMo-AwHoljdsH5C_kcTqlXS5p51OB1tvgQcMwB5rpTxg.72CHiYFecyDvuUa43KKT6w
14:19:38.227 DEBUG org.jose4j.jwe.InvalidCurveTest - Decryption failed as 
expected: org.jose4j.lang.JoseException: epk is invalid for P-256
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.jwe.InvalidCurveTest
[INFO] Running org.jose4j.jwe.NegativeJweKeyTest
14:19:38.230 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: 256 bit content encryption 
key is not the correct size for the A128GCM content encryption algorithm (128).
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 192 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 256 bit key was provided.
14:19:38.231 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 128 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 256 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 128 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 192 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 
bits or larger MUST be used with the all JOSE RSA algorithms (given key was 
only 1024 bits).
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 
bits or larger MUST be used with the all JOSE RSA algorithms (given key was 
only 1024 bits).
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: An RSA key of size 2048 
bits or larger MUST be used with the all JOSE RSA algorithms (given key was 
only 1024 bits).
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 8 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 56 bit key was provided.
14:19:38.232 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 64 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 128 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 192 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 248 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 264 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 384 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 512 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 9744 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 2352 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 7736 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A128CBC-HS256, expected a 256 bit key but a 4688 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 8 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 56 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 64 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 128 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 192 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 256 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 376 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 392 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 512 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 9744 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 2352 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 7736 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A192CBC-HS384, expected a 384 bit key but a 4688 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 8 bit key was provided.
14:19:38.233 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 56 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 64 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 128 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 192 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 256 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 384 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 504 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 520 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 9744 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 2352 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 7736 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for dir with 
A256CBC-HS512, expected a 512 bit key but a 4688 bit key was provided.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.PublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.PrivateKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: An empty octet sequence is 
to be used as the JWE Encrypted Key value when utilizing direct encryption but 
this JWE has 40 octets in the encrypted key part.
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.interfaces.ECPublicKey
14:19:38.234 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.interfaces.ECPublicKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: The key must not be null.
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPublicKeyImpl to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast sun.security.rsa.RSAPrivateCrtKeyImpl 
to java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey to 
java.security.interfaces.ECPrivateKey
14:19:38.235 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast org.jose4j.keys.AesKey to 
java.security.PublicKey
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Unable to encrypt 
(RSA/ECB/OAEPWithSHA-1AndMGF1Padding) the Content Encryption Key: 
java.security.InvalidKeyException: No installed provider supports this key: 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPublicKey
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key 
java.lang.ClassCastException: Cannot cast 
org.bouncycastle.jcajce.provider.asymmetric.ec.BCECPrivateKey to 
java.security.PublicKey
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 8 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 40 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 136 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 192 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected a 128 bit key but a 256 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A128KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 8 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 40 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 128 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 184 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected a 192 bit key but a 256 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A192KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 8 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 40 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 128 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 192 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 248 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected a 256 bit key but a 264 bit key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected an AES key but an RSA key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected an AES key but an EC key was provided.
14:19:38.236 DEBUG org.jose4j.jwe.NegativeJweKeyTest - Expected exception due 
to invalid key: org.jose4j.lang.InvalidKeyException: Invalid key for JWE 
A256KW, expected an AES key but an EC key was provided.
[INFO] Tests run: 29, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s 
- in org.jose4j.jwe.NegativeJweKeyTest
[INFO] Running org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest
eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwicDJjIjo2NTUzNiwicDJzIjoiR3k4cW44bHZicTY3d3dpbCJ9.o8IVuW9V6aEi6IeXbdtKfbptu4nPSNCK2TpEJAKyt4VVrlmJNdYbsQ.mSf3hJfjRI__E33JN_ZOLA.6CyLaFUTHa2jyp8xnFmDtw.Znr7LrCAdqpVe-_uS7CTZQ
[INFO] Tests run: 7, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.683 s 
- in org.jose4j.jwe.Pbes2HmacShaWithAesKeyWrapAlgorithmTest
[INFO] Running org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest
[INFO] Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.022 s 
- in org.jose4j.jwe.EcdhKeyAgreementAlgorithmTest
[INFO] Running org.jose4j.jwe.GeneralJweTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.jwe.GeneralJweTest
[INFO] Running org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest
[WARNING] Tests run: 4, Failures: 0, Errors: 0, Skipped: 1, Time elapsed: 0.003 
s - in org.jose4j.jwe.Aes128CbcHmacSha256ContentEncryptionAlgorithmTest
[INFO] Running org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest
[INFO] Tests run: 4, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.023 s 
- in org.jose4j.jwe.RsaOaepKeyManagementAlgorithmTest
[INFO] Running org.jose4j.jwe.CritHeaderTest
14:19:38.994 DEBUG org.jose4j.jws.JwsTestSupport - Expected something like 
this: org.jose4j.lang.JoseException: Unrecognized header 'so.crit' marked as 
critical.
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.jwe.CritHeaderTest
[INFO] Running org.jose4j.jwe.ZipTest
eyJ6aXAiOiJERUYiLCJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..DmnUfeLCmXlD452XuQ2nGg.VX8u83sdRbSL5LVdZD8LfXYPnpBCjlu0iZkkOSBWpdn62Qy4w-FHToC8oBtKT2hF-TPpap0D47bwIYRDpsxL9g.FlrsXCg0nPW8j1kwJUvfcg
eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..tb8Qom4QKLPTRz8SrMDsgg.77HGRRSIlWuKK1wghDSNpgkLYYbNT4pNNd2sQ3g-gOhPJj4zLKF8-ufqsxviBggBJAzC7xbTHYPgbtn9B2x5ZVqNmS6-H5V4mAf9sbiWHLjuw7SkB7A8JkiHM9u5YpmebFPpohPdbDMPSqXMzVWLNLXquaTLRlCQDX1zpAaZptxPo3n9VJtOqDJXBPn_JMJwpXnIGiZlEvDCeRDHzQFRH5zSV09O_K8amgDBfY_fVKthR_FS9KSGUf8qi4N-3yHjEmI91OoAqrtAV9raHStA8-ZZp7tZZyaGq-DeOmtQInmFWVwwWmxGIzzDsY3ungDyw2uvNuRZP4UINPTRKV-GYsa-AfoFxBciBzXxGxGQYTQxKVj9sB8laJEiSwpkzYBV.7togQFW_L2snM3HrgZ_YbQ
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.003 s 
- in org.jose4j.jwe.ZipTest
[INFO] Running org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s 
- in org.jose4j.jwe.Pbes2ExampleEncryptedRSAPrivateKeyJwkAppendixCTest
[INFO] Running org.jose4j.jwe.JweCryptoPrimitiveTest
14:19:39.006 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getCipher(): Cipher.RSA/ECB/OAEPWithSHA-1AndMGF1Padding, mode: 
key unwrapping, algorithm from: SunJCE
14:19:39.015 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@4ad3d266
14:19:39.020 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@3533df16
14:19:39.024 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKeyAgreement(): javax.crypto.KeyAgreement@15d0849
14:19:39.025 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKey(): 256 bit AES key
14:19:39.026 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getCipher(): Cipher.AESWrap, mode: key unwrapping, algorithm 
from: SunJCE
14:19:39.072 DEBUG o.jose4j.jwe.JweCryptoPrimitiveTest - 
cryptoPrimitive.getKey(): javax.crypto.spec.SecretKeySpec@fffe80f7
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.065 s 
- in org.jose4j.jwe.JweCryptoPrimitiveTest
[INFO] Running org.jose4j.jwe.JsonWebEncryptionTest
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.019 s 
- in org.jose4j.jwe.JsonWebEncryptionTest
[INFO] Running org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.011 s 
- in org.jose4j.jwe.Aes256GcmContentEncryptionAlgorithmTest
[INFO] Running org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.002 s 
- in org.jose4j.jwe.Rsa1_5KeyManagementAlgorithmTest
[INFO] Running org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.jwe.Aes128KeyWrapManagementAlgorithmTest
[INFO] Running org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest
14:19:39.116 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A256KW & A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiXzNlVHhENFJHdHFlaUo1Y2Z6LTdqWksxc3hwdV91bzJVb201QTFreTJfQSIsInkiOiJmODJwYXRzelFmZC1fSnZ2WXhVcVdpbEYxdXgyeHN6WWlUeWkyV3h6cF9nIiwiY3J2IjoiUC0yNTYifX0.-csTe0bWJRkYg95Glm7VrRI4fGYE2zP7_Dj--obsW-k77kzuX76DfA.s5KCZKtid9N-iOPFyDNZ3w.Y9-LL2goWcwohDTNBNkqHFgVXRXgLy6qh7rwycOri4EyJe9syl_y7AdlqIq4O7sEbjKpowuTtSPo5ntHtR3FMQ.Pe3Q3zKIKfEFrBTLOQ0p2Q
14:19:39.121 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A256KW & A192CBC-HS384: 
eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiclZsNWZiVnlWa29vX0N6ZDdRQktINVl3RjAxelVISFk2NERHT2YtS0taWSIsInkiOiJpUkxIM1NSVG4wQmNEd3FOUExta2I4S1JzeGVIbDlnZzZpZTdpc3RWZm5NIiwiY3J2IjoiUC0yNTYifX0.rZ3Fpc5w3AFak3h8oy39ybGvuXXnd0t9FJy4G6P_sPIc3XJpa5ayV9Kp-WUiXMa0uAj4XwsAR4Q.J83ZleRV61sgM86ZAalkgQ.6nQ2fltrj3geYIcb-LHR9FtlUKCFnbHAHZoVOV-82HJnIH3d64Ya1jXmElTlCvAiaGhSFIoD2IBFYyPJlik7pg.4uvw_hGOLV4g9C2BUav8C47dpT0huC1L
14:19:39.126 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A256KW & A256CBC-HS512: 
eyJhbGciOiJFQ0RILUVTK0EyNTZLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoicFFTV1FHb2djMnNVWDMyZllJTmZKX0JwT0lyVDNaMWt2MU1VekhHZW1RayIsInkiOiJBTWJqdWtiTVNsYkxQRlVXS01WVXZYUHlVTmtiNnRCeHRKMHBLVm1hellZIiwiY3J2IjoiUC0yNTYifX0.8tk9OJomyqhANLFgUID0a9hSJy0g9Ln4nR1Sw84nB5TqRxxv2RzMmhEptI9XalIyrkfZAllz2cBM5OlgjSzsoXBXijQJgH67.2CMb5alcjTJqQnwPHMsDRw.XusR_5us3iPH4xfo67s0vyPSMXlX1HJyxdp8piVA85_C4YsVJbJWtMl1piTnSpv87_9viCIz0lVFGujy9wtduw.lmxDFAVwP6LhABIu-3uReOhPi6-8BISfd-qOeK9ASqI
14:19:39.130 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A192KW & A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiQ2IxdWlUS0UwNmMxb0oxcnZGeDJHV3FaSlJHV1htbDlzMmNpR1I5ajFFTSIsInkiOiJrbWNaVnBrWFhMUEhGRHVrTVJxR0hLMU04al9MY1VmbUE1R0lSaTdTRE9ZIiwiY3J2IjoiUC0yNTYifX0.jVwnetAsMUemLvb8rgd6UdFGJaZC8O_25h-tPwH8KhQDfLtXl-2jaQ.VdRkiP2boYiZ5mk-lTK1zA.0RTJjrijj47BBtI9TiMBpmJFXoyCVuWhgmad9R2rrHsThlnWo_H5NKGPYa76DtiLRp8xiMs-bml8drULdv5HNA.dwcB_qFgZeBnTG-stoNcHA
14:19:39.135 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A192KW & A192CBC-HS384: 
eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiLTRvZjg3a2RpRXBBUElhZjd6WS0zVWRMX1JMUl8xdUpNV25SV3UzWENLTSIsInkiOiJRSllNWUc0LTlBWFBMdnlQb1JhelRNWnJtb0piOW1CLXItM29WZjdMUVE4IiwiY3J2IjoiUC0yNTYifX0.TTY_hdO0pKX15X4rP7ElsOKPidArqF0cIZvB2iA_a1VIOUr1WmvL_cbxV7-K7np97wBrhxUfaPo.F1TviHXbGCEXCqXPoy1gug.Duzf4eX_GV99_ToFB1eWgdfYca9xLnU6hZwV06FjI5oWePTCcxwhAIhX4nts1QJ9lRhDtfVWCv-Pwl5vvdsZVw.4Ppq_m-W7y7UMF59WN6OgaHImG6OEJ3N
14:19:39.140 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A192KW & A256CBC-HS512: 
eyJhbGciOiJFQ0RILUVTK0ExOTJLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiblVjYVdmMWYtekJkVUQ0RFlWalBoVTQwbXYyajhYTWl2VWJhNWhkTXdCZyIsInkiOiI1a2hCZlFGVDFOcG9DQ1lPNUJaaG8tT2h1VTZTUTByZk94NnBhRTR0OXpjIiwiY3J2IjoiUC0yNTYifX0.8g2EViEz0o4RS3Sty1h81nnaEW5xjA0mPcQATQFAZ50Zfs4KndaopVcGmj4XH03g2fyAnTnLjreCnbflIqAmKLDKegdsnUMY.BdoZxwV2jk0XPBGlCXHGAQ.goQ4PODwq1C-MonhQBhpjFBtA0XakpXyHpQMSepGHY--Snvznm3v0ntT4EyKe77wRP-A-kbTEObjw-h98wEocg.LtSpcLUSWJIJVJrO3x-Hlgf40UeSnycmV86nJF2kYt8
14:19:39.145 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A128KW & A128CBC-HS256: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExMjhDQkMtSFMyNTYiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiUGRJNWM5QXVfMElvTzRmSkx2dTZpWTFlanBoZVMzcWdVWk13RmhBYlhoUSIsInkiOiIyNzNfU29uZHhyQV9rTUtwZnNIYUYwQUhLSE1NM0VGeTVwMU42MVEtTVVRIiwiY3J2IjoiUC0yNTYifX0.iASJx9JP40kO6AG4MUiUCn9HaV-74trsExuYTm1XfRqPP87dmv2gxQ.b_V4ks9RQ6LvcPXotjRyTA.5Qj_BPTOya0b1hd-1VfWUo_GxBdPHVHMK3P2hQEqpE6x-3rJV7WtG-4a1vEvtuDRkHd0fzIkMMVOibo69KnpaA.b_wX6mYSxKKleu3Umlh7Ug
14:19:39.150 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A128KW & A192CBC-HS384: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkExOTJDQkMtSFMzODQiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiX05HSTFoYmFDRFdxNWYtTVhBczg0bEwyMWU2cVYxVjdtdDluQXFyZ0VRYyIsInkiOiJnMFMzQld3a21QV1ZwbVkzQzJ3N1FrUU93RmRIZjY4QUFySFBNek9VRVdFIiwiY3J2IjoiUC0yNTYifX0.w0hIi2jtRJ7XcLHK62aJkjpXaJykD4k_RHzX54xhGvNkMdHQuX76KviEAgz8_TtzYFHHx3SY06k.eTrXGRFcZarRRT14uWjloQ.c6LbF385mg9vzVMRy4Od9issIqyybItMEr4-rnBreqBuTKxiU8ISmVfnrgdV1Q2HaF9ZRyx9nhUvUHCzNWGFOQ.fY6dx4n8H4vomfwyZUfbBxOpSfCWBqnP
14:19:39.155 DEBUG o.j.j.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest - JWE w/ 
ECDH-ES+A128KW & A256CBC-HS512: 
eyJhbGciOiJFQ0RILUVTK0ExMjhLVyIsImVuYyI6IkEyNTZDQkMtSFM1MTIiLCJlcGsiOnsia3R5IjoiRUMiLCJ4IjoiZXFZR1BqWjg1RVNnVTQ1cVZrZThkOU9kMEZMUWs5ZEFidWtyR2R1Y1F3YyIsInkiOiJXaDZEUjZUSE1KN21TOVFrcVhKcWM2TkEtajA0NXVQX3ZoWDY1TWdGVFYwIiwiY3J2IjoiUC0yNTYifX0.aHeT8Ca34khE5Zl35VSV5x0njvxsj54eDdVMMH9z9Gbm-4x3ZBXMvo8XVx684ZZMZ-m9d6BQaz7_vrcxetBcAaIZ3dn6QRy_.qP6GlXisBbo_CmA8vwlfeA.EfjKaOVXvTtZBB5czomvXAeS0BOnF3jJeDdynzh3_dDyH08x5-tAzQuRnrh61LHu8uPkUAcz4Vmr3KyZdPT_Pw.hea2opsfyiUjE3YwNjNhx_eUs7JOylyk8TeOPKrzhUQ
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.045 s 
- in org.jose4j.jwe.EcdhKeyAgreementWithAesKeyWrapAlgorithmTest
[INFO] Running org.jose4j.jwe.NegativeJweWrappingTest
14:19:39.162 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. 
Substituting a randomly generated CEK and proceeding. 
java.security.InvalidKeyException: Unwrapping failed at 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error 
at java.base/sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:369); 
java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:282); 
java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...
14:19:39.162 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.164 DEBUG o.j.j.RsaKeyManagementAlgorithm$Rsa1_5 - Key unwrap failed. 
Substituting a randomly generated CEK and proceeding. 
java.security.InvalidKeyException: Unwrapping failed at 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error 
at java.base/sun.security.rsa.RSAPadding.unpadV15(RSAPadding.java:369); 
java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:282); 
java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...
14:19:39.164 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.166 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. 
Substituting a randomly generated CEK and proceeding. 
java.security.InvalidKeyException: Unwrapping failed at 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error 
at java.base/sun.security.rsa.RSAPadding.unpadOAEP(RSAPadding.java:488); 
java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:284); 
java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...
14:19:39.166 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.168 DEBUG o.j.j.RsaKeyManagementAlgorithm$RsaOaep - Key unwrap failed. 
Substituting a randomly generated CEK and proceeding. 
java.security.InvalidKeyException: Unwrapping failed at 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:468); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...; caused by: javax.crypto.BadPaddingException: Decryption error 
at java.base/sun.security.rsa.RSAPadding.unpadOAEP(RSAPadding.java:488); 
java.base/sun.security.rsa.RSAPadding.unpad(RSAPadding.java:284); 
java.base/com.sun.crypto.provider.RSACipher.doFinal(RSACipher.java:372); 
java.base/com.sun.crypto.provider.RSACipher.engineUnwrap(RSACipher.java:463); 
java.base/javax.crypto.Cipher.unwrap(Cipher.java:2590); 
org.jose4j.jwe.WrappingKeyManagementAlgorithm.manageForDecrypt(WrappingKeyManagementAlgorithm.java:130);
 ...omitted...
14:19:39.168 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.170 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=FlleGhb7Jp-VlWS1wonqsA
14:19:39.171 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.IntegrityException: Authentication tag 
check failed. Message=s4c-Nx6Dq7rAQrV7Gy7kwQ
14:19:39.173 DEBUG o.jose4j.jwe.NegativeJweWrappingTest - Expected exception 
processing modified JWE org.jose4j.lang.InvalidKeyException: 256 bit content 
encryption key is not the correct size for the A192CBC-HS384 content encryption 
algorithm (384).
eyJhbGciOiJSU0EtT0FFUCIsImVuYyI6IkExMjhDQkMtSFMyNTYifQ.eqrzAN7XdUGevOenodfF_hhSx3GgiZ0icTaTHgqsilFOHc6gbdJPQXfsWUMl7YOqhj6fHsRWpicDs1iZrjynHJipqIN4hEYGF3cqEG1KjWRhZckfGtOym0JWYaoWxKC1oqI4XKtOSe_rMnymB67hDCjQ30k8Yc53o7uXvRB9-dMYZwrAKe0j2LFiqUOHA4UhUCHZiUNsSzLCVDVgBvxrolEySDhC8B4Tf7A8tQz3NFf-laCUupy2fQzd6vVGNl00271AGqm9a_CQtiIVvH7bGnMrWMtg47WB50C0xx0GnykbEa5uRRYORnA23I3SYHFKGH16og44TU98PfcfT6IZjQ.shk-LQhhBKJ7PKkKGinohg.gwPbcXRuPQkyGVf_YOisDbDfOD0E9e76ieD9yrfkpUq7yKOdsB1lWyzFjbMo3C_OO5mzRAp8E7-7KJbNmrnXlc98ENeV6po0nD3nFjQhsOM.d78UrgBln74CKtH8nT-9EQ
[INFO] Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.016 s 
- in org.jose4j.jwe.NegativeJweWrappingTest
[INFO] Running org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest
[INFO] Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.zip.DeflateRFC1951CompressionAlgorithmTest
[INFO] Running org.jose4j.lang.MathsTest
[INFO] Tests run: 9, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.001 s 
- in org.jose4j.lang.MathsTest
[INFO] Running org.jose4j.lang.ByteUtilTest
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (2147483647) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (-2147483648) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (268435456) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870929) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870920) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (536870928) for 
converting to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (-1) for converting 
to bit length
14:19:39.183 DEBUG org.jose4j.lang.ByteUtil - This was expected: 
org.jose4j.lang.UncheckedJoseException: Invalid byte length (-536870928) for 
converting to bit length
[INFO] Tests run: 30, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.004 s 
- in org.jose4j.lang.ByteUtilTest
[INFO] Running org.jose4j.lang.JsonHelpTest
[INFO] Tests run: 1, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0 s - in 
org.jose4j.lang.JsonHelpTest
[INFO] Running org.jose4j.cookbook.JoseCookbookTest
[INFO] Tests run: 22, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.16 s 
- in org.jose4j.cookbook.JoseCookbookTest
[INFO]
[INFO] Results:
[INFO]
[ERROR] Failures:
[ERROR]   EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate256:53 
expected:<EC Private Key 
[8b:e2:14:0f:3a:17:e9:25:d1:ae:df:18:a3:b2:9a:fd:63:04:41:11]
            X: 7fcdce2770f6c45d4183cbee6fdb4b7b580733357be9ef13bacf6e3c7bd15445
            Y: c7f144cd1bbd9b7e872cdfedb9eeb9f4b3695d6ea90b24ad8a4623288588e5ad
but was:<sun.security.ec.ECPrivateKeyImpl@f7754045>
[ERROR]   EllipticCurveJsonWebKeyTest.testParseExampleWithPrivate512:94 
expected:<EC Private Key 
[37:fe:6d:9b:cb:45:df:bb:57:16:94:75:87:d7:e7:46:6d:c4:dc:c5]
            X: 
1e929050f124fc6bc55c7d5393365df9def4ab0c22cb25798f934eb04e3c6bae3701a57a7910e9d81bf363159e8ebcb155d6349f4bdb6ccf8a94c5c59c7aac101a4
            Y: 
34a6440e376750d2371fd1bdc2c8f3b71d2f4ee5ea3432c815cca31560fe5d9387ec774b55838630e5cbbf5a8cbe0a91dd0064c6999a1f6e6e67faddede4c8c8f6
but was:<sun.security.ec.ECPrivateKeyImpl@44924e16>
[ERROR] Errors:
[ERROR]   KeyPairUtilTest.ecPublicKeyEncoding:81 ยป InvalidKeySpec 
java.security.InvalidK...
[INFO]
[ERROR] Tests run: 575, Failures: 2, Errors: 1, Skipped: 3
[INFO]
[INFO] ------------------------------------------------------------------------
[INFO] BUILD FAILURE
[INFO] ------------------------------------------------------------------------
[INFO] Total time:  11.824 s
[INFO] Finished at: 2023-12-10T14:19:41Z
[INFO] ------------------------------------------------------------------------
[ERROR] Failed to execute goal 
org.apache.maven.plugins:maven-surefire-plugin:2.22.3:test (default-test) on 
project jose4j: There are test failures.
[ERROR]
[ERROR] Please refer to /<<PKGBUILDDIR>>/target/surefire-reports for the 
individual test results.
[ERROR] Please refer to dump files (if any exist) [date].dump, 
[date]-jvmRun[N].dump and [date].dumpstream.
[ERROR] -> [Help 1]
[ERROR]
[ERROR] To see the full stack trace of the errors, re-run Maven with the -e 
switch.
[ERROR] Re-run Maven using the -X switch to enable full debug logging.
[ERROR]
[ERROR] For more information about the errors and possible solutions, please 
read the following articles:
[ERROR] [Help 1] 
http://cwiki.apache.org/confluence/display/MAVEN/MojoFailureException
dh_auto_test: error: /usr/lib/jvm/default-java/bin/java -noverify -cp /usr/share/maven/boot/plexus-classworlds-2.x.jar 
-Dmaven.home=/usr/share/maven -Dmaven.multiModuleProjectDirectory=/<<PKGBUILDDIR>> 
-Dclassworlds.conf=/etc/maven/m2-debian.conf -Dproperties.file.manual=/<<PKGBUILDDIR>>/debian/maven.properties 
org.codehaus.plexus.classworlds.launcher.Launcher -s/etc/maven/settings-debian.xml 
-Ddebian.dir=/<<PKGBUILDDIR>>/debian -Dmaven.repo.local=/<<PKGBUILDDIR>>/debian/maven-repo --batch-mode 
test returned exit code 1
make: *** [debian/rules:4: binary] Error 25
dpkg-buildpackage: error: debian/rules binary subprocess returned exit status 2
--------------------------------------------------------------------------------

The above is just how the build ends and not necessarily the most relevant part.
If required, the full build log is available here:

https://people.debian.org/~sanvila/build-logs/202312/

About the archive rebuild: The build was made using virtual machines
from AWS, with enough memory, enough disk, and either one or two
CPUs, using a reduced chroot with only build-essential packages.

If you could not reproduce the bug please contact me privately, as I
am willing to provide ssh access to a virtual machine where the bug is
fully reproducible.

If this is really a bug in one of the build-depends, please use
reassign and affects, so that this is still visible in the BTS web
page for this package.

Thanks.

--- End Message ---
--- Begin Message ---
Hello.

I'm unable to reproduce this anymore.

I think the problem was not available memory, and it was not CPU either,
because I can build it again with instances of type c6a.large (4 GB of RAM).

My theory is that this could be some build-dependency which propagated
to testing between 2023-12-13 (where I have failed builds) and
2023-12-17 (where the builds started to work again), so I leave that
to bug archeologists.

Thanks.

--- End Message ---
__
This is the maintainer address of Debian's Java team
<https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-java-maintainers>.
 Please use
[email protected] for discussions and questions.

Reply via email to