'L1Q      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOP krdlab@gmail.com experimentalNone0     krdlab@gmail.com experimentalNone !"#$ !"#$ !"#$ !"#$krdlab@gmail.com experimentalNone QRSTUVWXYZ[\ QRSTUVWXYZ[QRSTUVWXYZ[\krdlab@gmail.com experimentalNone+ An OpenID Provider Configuration9An OpenID Provider information+,-./0123456789:;<?+,-./0123456789:;<9:;<+,-./012345678+ ,-./0123456789:;<?krdlab@gmail.com experimentalNone@@This data type represents information needed in the OpenID flow. @ABCDEFGHIOP's information (obtained by  )J client ID client secretSredirect URI (the HTTP endpont on your server that will receive a response from OP) @ABCDEFGHIJ @ABCDEFGHIJ@ABCDEFGHIJkrdlab@gmail.com experimentalNoneKKKKkrdlab@gmail.com experimentalNoneL@This function obtains OpenID Provider configuration and JWK set.L!OpenID Provider's Issuer location+,-./0123456789:;<KLLK9:;<+,-./012345678Lkrdlab@gmail.com experimentalNoneM#Make URL for Authorization Request.NRequest and validate tokens.zThis function requests ID Token and Access Token to a OP's token endpoint, and validates the received ID Token. Returned  value is a valid.UIf a HTTP error has occurred or a tokens validation has failed, this function throws .M?used to specify what are privileges requested for tokens. (use  ScopeValue)1used for CSRF mitigation. (recommended parameter)Optional parametersN]^_OPMNOPMNOPMN]^_OP krdlab@gmail.com experimentalNone}`abcdefghijklmnopqrstuvwxyz{|}~  !"#$+,-./0123456789:;<@IJKLMNOP@IJ    !"#$$%&''()*+,-./01233456789:;<=>?@@ABCDEFFGHIJKLMNOP QRSTUU()*+,VWXYZ[\]^_`^_a^_b^_c^_d^_e^_f^_g^_h^_h^ij^ik^il^_m^_m^_n^_o^_p^_q^_r^_s^_t^_u^_r^_s^_v^_w^_x^_y^_y^_z^_{^_{^_|^_}^_~^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_^_*oidc-client-0.3.0.1-I7F5QmOTiwvDyUSgzf07b7Web.OIDC.Client.TypesWeb.OIDC.Client.Tokens"Web.OIDC.Client.Discovery.ProviderWeb.OIDC.Client.Settings!Web.OIDC.Client.Discovery.IssuersWeb.OIDC.Client.DiscoveryWeb.OIDC.Client.CodeFlowWeb.OIDC.Client.InternaldiscoverWeb.OIDC.ClientOpenIdExceptionDiscoveryExceptionInternalHttpException JwtExceptoinValidationExceptionCode ParametersStateScope ScopeValueIssuerLocationopenIdprofileemailaddressphone offlineAccess$fExceptionOpenIdException$fShowOpenIdException IdTokenClaimsisssubaudexpiatIdTokenclaimsjwtTokens accessToken tokenTypeidToken expiresIn refreshToken$fShowIdTokenClaims$fEqIdTokenClaims $fShowIdToken $fEqIdToken $fShowTokens $fEqTokens ConfigurationissuerauthorizationEndpoint tokenEndpointuserinfoEndpointrevocationEndpointjwksUriresponseTypesSupportedsubjectTypesSupported idTokenSigningAlgValuesSupportedscopesSupported!tokenEndpointAuthMethodsSupportedclaimsSupportedProvider configurationjwkSet$fShowConfiguration$fEqConfiguration$fFromJSONConfigurationOIDCoidcAuthorizationServerUrloidcTokenEndpoint oidcClientIdoidcClientSecretoidcRedirectUri oidcProviderdefnewOIDCsetCredentialsgooglegetAuthenticationRequestUrl requestTokensvalidateClaimsgetCurrentIntDateTokensResponse textToIntrethrowtoIdTokenClaimsparseUrl$fFromJSONTokensResponsevalidatevalidateIdToken getClaims%jose-jwt-0.7.6-D2yi3TM7dXN5omeg9H0X2q Jose.Types parseHeader encodeHeader defJweHdr defJwsHdr JwtHeaderJweHJwsH UnsecuredHIntDateJose.Jwt decodeClaimsdecodeencodeJwtunJwtPayloadNestedClaimsJwsJwe JwtContent Unsecured JwtEncoding JwsEncoding JweEncodingKeyIdUTCKeyId JwsHeaderjwsAlgjwsTypjwsCtyjwsKid JweHeaderjweAlgjweEncjweTypjweCtyjweZipjweKid JwtClaimsjwtIssjwtSubjwtAudjwtExpjwtNbfjwtIatjwtJtiJwtErrorKeyError BadAlgorithmBadDots BadHeader BadClaims BadSignature BadCrypto Base64Error