&AF      !"#$%&'()*+,-./0123456789:;<=>?@ABCDE krdlab@gmail.com experimentalNone+ FGHI     FGHIkrdlab@gmail.com experimentalNone An OpenID Provider ConfigurationAn OpenID Provider information !"J !" !"  !"Jkrdlab@gmail.com experimentalNone#@This data type represents information needed in the OpenID flow. #$%&'()*+,OP's information (obtained by )- client ID client secretSredirect URI (the HTTP endpont on your server that will receive a response from OP) #$%&'()*+,- #$%&'()*+,-#$%&'()*+,-krdlab@gmail.com experimentalNone....krdlab@gmail.com experimentalNone/0123456789:;<=>?@/0123456789:;<=>?@:;<=>?@6789/012345/0123456789:;<=>?@ krdlab@gmail.com experimentalNone KLMNOPQRSTU KLMNOPQRSTKLMNOPQRSTUkrdlab@gmail.com experimentalNoneA#Make URL for Authorization Request.BRequest and validate tokens.zThis function requests ID Token and Access Token to a OP's token endpoint, and validates the received ID Token. Returned : value is a valid.UIf a HTTP error has occurred or a tokens validation has failed, this function throws .A?used to specify what are privileges requested for tokens. (use  )1used for CSRF mitigation. (recommended parameter)Optional parametersBVWXCDABCDABCDABVWXCDkrdlab@gmail.com experimentalNoneE@This function obtains OpenID Provider configuration and JWK set.E!OpenID Provider's Issuer location !".EE. !"E krdlab@gmail.com experimentalNone}YZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~  !"#,-./0123456789:;<=>?@ABCDE#,-    !"#$%&'())*+,,-./01234567789:;<==>?@@ABCDEFGHIJKLMN O O A B C D E P Q R STUVWXYWXZWX[WX\WX]WX^WX_WX`WXaWXbWXcWXcWdeWdfWdgWXhWXiWXiWXjWXkWXlWXmWXnWXnWXmWXoWXpWXqWXrWXsWXbWXtWXuWXvWXwWXxWXxWXyWXzWX{WX|WX}WX~WXWXWXWXWXWXWXWXWXWXWXWXWXWXWXWXWXWXWXWXoidcc_FuP2Aw9xMhzLxId0g83PXrWeb.OIDC.Client.Types"Web.OIDC.Client.Discovery.ProviderWeb.OIDC.Client.Settings!Web.OIDC.Client.Discovery.IssuersWeb.OIDC.Client.TokensWeb.OIDC.Client.CodeFlowWeb.OIDC.Client.DiscoverydiscoverWeb.OIDC.Client.InternalWeb.OIDC.ClientOpenIdExceptionDiscoveryExceptionInternalHttpException JwtExceptoinValidationExceptionCode ParametersStateScope ScopeValueOpenIdProfileEmailAddressPhone OfflineAccessIssuerLocation ConfigurationissuerauthorizationEndpoint tokenEndpointuserinfoEndpointrevocationEndpointjwksUriresponseTypesSupportedsubjectTypesSupported idTokenSigningAlgValuesSupportedscopesSupported!tokenEndpointAuthMethodsSupportedclaimsSupportedProvider configurationjwkSetOIDCoidcAuthorizationSeverUrloidcTokenEndpoint oidcClientIdoidcClientSecretoidcRedirectUri oidcProviderdefnewOIDCsetCredentialsgoogle IdTokenClaimsisssubaudexpiatIdTokenclaimsjwtTokens accessToken tokenTypeidToken expiresIn refreshTokengetAuthenticationRequestUrl requestTokensvalidateClaimsgetCurrentIntDate$fExceptionOpenIdException$fFromJSONScopeValue$fReadScopeValue$fShowScopeValue$fFromJSONConfigurationTokensResponserethrowtoIdTokenClaimsparseUrl$fFromJSONTokensResponsevalidatevalidateIdToken getClaimsjosej_AfJi2nUx8e0ImLAaai3pAK Jose.Types parseHeader encodeHeader defJweHdr defJwsHdr UnsecuredHJwsHJweH JwtHeaderUTCKeyIdKeyIdIntDateJose.Jwt decodeClaimsdecodeencodeunJwtJwtClaimsNestedPayloadJwsJwe Unsecured JwtContent JweEncoding JwsEncoding JwtEncodingjwsKidjwsCtyjwsTypjwsAlg JwsHeaderjweKidjweZipjweCtyjweTypjweEncjweAlg JweHeaderjwtJtijwtIatjwtNbfjwtExpjwtAudjwtSubjwtIss JwtClaims Base64Error BadCrypto BadSignature BadClaims BadHeaderBadDots BadAlgorithmKeyErrorJwtError