!>n4e      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcd krdlab@gmail.com experimentalNone2j oidc-client#Manages state and nonce. (Maybe OIDC should have them) oidc-client"Generate state and nonce at random oidc-clientShould delete at least nonce    krdlab@gmail.com experimentalNone efghijklmnkrdlab@gmail.com experimentalNone_ ? oidc-client An OpenID Provider Configuration. oidc-clientAn OpenID Provider information !"#$%&'()*+,-./01./01 !"#$%&'()*+,-krdlab@gmail.com experimentalNone8 oidc-client@This data type represents information needed in the OpenID flow.A oidc-clientOP's information (obtained by  )B oidc-client client ID oidc-client client secret oidc-clientSredirect URI (the HTTP endpont on your server that will receive a response from OP) 89:;<=>?@AB 89:;<=>?@ABkrdlab@gmail.com experimentalNone7_C oidc-clientClaims required for an  =https://openid.net/specs/openid-connect-core-1_0.html#IDTokenID Token=, plus recommended claims (nonce) and other custom claims.CDHFEGIJKLMNOPQRSLMNOPQRCDHFEGIJKSkrdlab@gmail.com experimentalNoneZ oidc-clientIMake URL for Authorization Request after generating state and nonce from .[ oidc-clientDGet and validate access token and with code and state stored in the ". Then deletes session info by .\ oidc-client#Make URL for Authorization Request.Z oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-clientOptional parameters\ oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-client1used for CSRF mitigation. (recommended parameter) oidc-clientOptional parametersZ[\\[Zkrdlab@gmail.com experimentalNone ]]krdlab@gmail.com experimentalNone#S^ oidc-client@This function obtains OpenID Provider configuration and JWK set.^ oidc-client!OpenID Provider's Issuer location !"#$%&'()./01]^^]./01 !"#$%&'()krdlab@gmail.com experimentalNone1_ oidc-clientIMake URL for Authorization Request after generating state and nonce from .` oidc-clientDGet and validate access token and with code and state stored in the ". Then deletes session info by .a oidc-client#Make URL for Authorization Request.b oidc-clientRequest and validate tokens.zThis function requests ID Token and Access Token to a OP's token endpoint, and validates the received ID Token. Returned L value is a valid.UIf a HTTP error has occurred or a tokens validation has failed, this function throws ._ oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-clientOptional parametersa oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-client1used for CSRF mitigation. (recommended parameter) oidc-clientOptional parameters_`abcda`_bcd krdlab@gmail.com experimentalNone2opqrstuvwxyz{|}~  !"#$%&'()./018ABCDHFEGIJKLMNOPQRS]^_`abcd8AB    !"#$%&''()*+,-./012344567789:;<=>?@@ABCDEFGHIJJKLMNOPQRRSTUVWXYZ[\]^_`ab _cadef g g W V U T S h i jklmklnkloklpklqklrklskltkluklukvwkvxkvyklzklzkl{kl|kl}kl~klklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklklkl*oidc-client-0.5.0.0-IhdoflDOyYND5lpmallvKnWeb.OIDC.Client.Types"Web.OIDC.Client.Discovery.ProviderWeb.OIDC.Client.SettingsWeb.OIDC.Client.TokensWeb.OIDC.Client.IdTokenFlow!Web.OIDC.Client.Discovery.IssuersWeb.OIDC.Client.DiscoveryWeb.OIDC.Client.CodeFlowWeb.OIDC.Client.InternaldiscoverWeb.OIDC.Client SessionStoresessionStoreGeneratesessionStoreSavesessionStoreGetsessionStoreDeleteOpenIdExceptionDiscoveryExceptionInternalHttpException JsonException UnsecuredJwt JwtExceptoinValidationExceptionCode ParametersNonceStateScope ScopeValueIssuerLocationopenIdprofileemailaddressphone offlineAccess$fExceptionOpenIdException$fShowOpenIdException ConfigurationissuerauthorizationEndpoint tokenEndpointuserinfoEndpointrevocationEndpointjwksUriresponseTypesSupportedsubjectTypesSupported idTokenSigningAlgValuesSupportedscopesSupported!tokenEndpointAuthMethodsSupportedclaimsSupported JwsAlgJson Unsupported getJwsAlgProvider configurationjwkSet$fFromJSONJwsAlgJson$fShowJwsAlgJson$fEqJwsAlgJson$fShowConfiguration$fEqConfiguration$fFromJSONConfigurationOIDCoidcAuthorizationServerUrloidcTokenEndpoint oidcClientIdoidcClientSecretoidcRedirectUri oidcProviderdefnewOIDCsetCredentials IdTokenClaimsisssubaudexpiatnonce otherClaimsTokens accessToken tokenTypeidToken expiresIn refreshTokenvalidateIdToken$fFromJSONIdTokenClaims$fShowIdTokenClaims$fEqIdTokenClaims$fGenericIdTokenClaims $fShowTokens $fEqTokensprepareAuthenticationRequestUrlgetValidIdTokenClaimsgetAuthenticationRequestUrlgooglegetValidTokens requestTokensvalidateClaimsgetCurrentIntDateTokensResponse textToIntrethrowparseUrl%jose-jwt-0.8.0-2GXNHu46YKS88HFcfIDIze Jose.Types parseHeader encodeHeader defJweHdr defJwsHdr JwtHeaderJweHJwsH UnsecuredHIntDateJose.Jwt decodeClaimsdecodeencodeJwtunJwtPayloadNestedClaimsJwsJwe JwtContent Unsecured JwtEncoding JwsEncoding JweEncodingKeyIdUTCKeyId JwsHeaderjwsAlgjwsTypjwsCtyjwsKid JweHeaderjweAlgjweEncjweTypjweCtyjweZipjweKid JwtClaimsjwtIssjwtSubjwtAudjwtExpjwtNbfjwtIatjwtJtiJwtErrorKeyError BadAlgorithmBadDots BadHeader BadClaims BadSignature BadCrypto Base64Error