'1#Q      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOP krdlab@gmail.com experimentalNone0     krdlab@gmail.com experimentalNone !"#$ !"#$ !"#$ !"#$krdlab@gmail.com experimentalNone QRSTUVWXYZ[ QRSTUVWXYZQRSTUVWXYZ[krdlab@gmail.com experimentalNone+ An OpenID Provider Configuration9An OpenID Provider information+,-./0123456789:;<?+,-./0123456789:;<9:;<+,-./012345678+ ,-./0123456789:;<?krdlab@gmail.com experimentalNone@@This data type represents information needed in the OpenID flow. @ABCDEFGHIOP's information (obtained by  )J client ID client secretSredirect URI (the HTTP endpont on your server that will receive a response from OP) @ABCDEFGHIJ @ABCDEFGHIJ@ABCDEFGHIJkrdlab@gmail.com experimentalNoneKKKKkrdlab@gmail.com experimentalNoneL@This function obtains OpenID Provider configuration and JWK set.L!OpenID Provider's Issuer location+,-./0123456789:;<KLLK9:;<+,-./012345678Lkrdlab@gmail.com experimentalNoneM#Make URL for Authorization Request.NRequest and validate tokens.zThis function requests ID Token and Access Token to a OP's token endpoint, and validates the received ID Token. Returned  value is a valid.UIf a HTTP error has occurred or a tokens validation has failed, this function throws .M?used to specify what are privileges requested for tokens. (use  ScopeValue)1used for CSRF mitigation. (recommended parameter)Optional parametersN\]^OPMNOPMNOPMN\]^OP krdlab@gmail.com experimentalNone}_`abcdefghijklmnopqrstuvwxyz{|}~  !"#$+,-./0123456789:;<@IJKLMNOP@IJ    !"#$$%&''()*+,-./01233456789:;<=>?@@ABCDEFFGHIJKLMNOP QRSTUU()*+,VWXYZ[\]^_]^`]^a]^b]^c]^d]^e]^f]^g]^g]hi]hj]hk]^l]^l]^m]^n]^o]^p]^q]^r]^s]^t]^q]^r]^u]^v]^w]^x]^x]^y]^z]^z]^{]^|]^}]^~]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^]^*oidc-client-0.3.0.0-EmwYAOlonjI1IFFY1EC2gtWeb.OIDC.Client.TypesWeb.OIDC.Client.Tokens"Web.OIDC.Client.Discovery.ProviderWeb.OIDC.Client.Settings!Web.OIDC.Client.Discovery.IssuersWeb.OIDC.Client.DiscoveryWeb.OIDC.Client.CodeFlowWeb.OIDC.Client.InternaldiscoverWeb.OIDC.ClientOpenIdExceptionDiscoveryExceptionInternalHttpException JwtExceptoinValidationExceptionCode ParametersStateScope ScopeValueIssuerLocationopenIdprofileemailaddressphone offlineAccess$fExceptionOpenIdException$fShowOpenIdException IdTokenClaimsisssubaudexpiatIdTokenclaimsjwtTokens accessToken tokenTypeidToken expiresIn refreshToken$fShowIdTokenClaims$fEqIdTokenClaims $fShowIdToken $fEqIdToken $fShowTokens $fEqTokens ConfigurationissuerauthorizationEndpoint tokenEndpointuserinfoEndpointrevocationEndpointjwksUriresponseTypesSupportedsubjectTypesSupported idTokenSigningAlgValuesSupportedscopesSupported!tokenEndpointAuthMethodsSupportedclaimsSupportedProvider configurationjwkSet$fShowConfiguration$fEqConfiguration$fFromJSONConfigurationOIDCoidcAuthorizationServerUrloidcTokenEndpoint oidcClientIdoidcClientSecretoidcRedirectUri oidcProviderdefnewOIDCsetCredentialsgooglegetAuthenticationRequestUrl requestTokensvalidateClaimsgetCurrentIntDateTokensResponserethrowtoIdTokenClaimsparseUrl$fFromJSONTokensResponsevalidatevalidateIdToken getClaims%jose-jwt-0.7.3-8WGi0V26SMHLNEn55B1mf5 Jose.Types parseHeader encodeHeader defJweHdr defJwsHdr JwtHeaderJweHJwsH UnsecuredHIntDateJose.Jwt decodeClaimsdecodeencodeJwtunJwtPayloadNestedClaimsJwsJwe JwtContent Unsecured JwtEncoding JwsEncoding JweEncodingKeyIdUTCKeyId JwsHeaderjwsAlgjwsTypjwsCtyjwsKid JweHeaderjweAlgjweEncjweTypjweCtyjweZipjweKid JwtClaimsjwtIssjwtSubjwtAudjwtExpjwtNbfjwtIatjwtJtiJwtErrorKeyError BadAlgorithmBadDots BadHeader BadClaims BadSignature BadCrypto Base64Error