!>4f      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcde krdlab@gmail.com experimentalNone2w oidc-client#Manages state and nonce. (Maybe OIDC should have them) oidc-client"Generate state and nonce at random oidc-clientShould delete at least nonce    krdlab@gmail.com experimentalNone fghijklmnokrdlab@gmail.com experimentalNone_ L oidc-client An OpenID Provider Configuration. oidc-clientAn OpenID Provider information !"#$%&'()*+,-./01./01 !"#$%&'()*+,-krdlab@gmail.com experimentalNone8 oidc-client@This data type represents information needed in the OpenID flow.A oidc-clientOP's information (obtained by  )B oidc-client client ID oidc-client client secret oidc-clientSredirect URI (the HTTP endpont on your server that will receive a response from OP) 89:;<=>?@AB 89:;<=>?@ABkrdlab@gmail.com experimentalNone7_C oidc-clientClaims required for an  =https://openid.net/specs/openid-connect-core-1_0.html#IDTokenID Token=, plus recommended claims (nonce) and other custom claims.CDHFEGIJKLMNOPQRSLMNOPQRCDHFEGIJKSkrdlab@gmail.com experimentalNoneZ oidc-clientIMake URL for Authorization Request after generating state and nonce from .[ oidc-clientDGet and validate access token and with code and state stored in the ". Then deletes session info by .\ oidc-client#Make URL for Authorization Request.Z oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-clientOptional parameters\ oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-client1used for CSRF mitigation. (recommended parameter) oidc-clientOptional parametersZ[\\[Zkrdlab@gmail.com experimentalNone ]]krdlab@gmail.com experimentalNone#`^ oidc-client@This function obtains OpenID Provider configuration and JWK set.^ oidc-client!OpenID Provider's Issuer location !"#$%&'()./01]^_^]./01 !"#$%&'()_krdlab@gmail.com experimentalNone1` oidc-clientIMake URL for Authorization Request after generating state and nonce from .a oidc-clientDGet and validate access token and with code and state stored in the ". Then deletes session info by .b oidc-client#Make URL for Authorization Request.c oidc-clientRequest and validate tokens.zThis function requests ID Token and Access Token to a OP's token endpoint, and validates the received ID Token. Returned L value is a valid.UIf a HTTP error has occurred or a tokens validation has failed, this function throws .` oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-clientOptional parametersb oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-client1used for CSRF mitigation. (recommended parameter) oidc-clientOptional parameters`abcdeba`cde krdlab@gmail.com experimentalNone2pqrstuvwxyz{|}~  !"#$%&'()./018ABCDHFEGIJKLMNOPQRS]^_`abcde8AB    !"#$%&''()*+,-./012344567789:;<=>?@@ABCDEFGHIJJKLMNOPQRRSTUVWXYZ[\]^_`ab c_daefg h h W V U T S i j klmnlmolmplmqlmrlmslmtlmulmvlmvlwxlwylwzlm{lm{lm|lm}lm~lmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlmlm*oidc-client-0.5.1.0-IwuoqC0oEKz2DYK37e6xSGWeb.OIDC.Client.Types"Web.OIDC.Client.Discovery.ProviderWeb.OIDC.Client.SettingsWeb.OIDC.Client.TokensWeb.OIDC.Client.IdTokenFlow!Web.OIDC.Client.Discovery.IssuersWeb.OIDC.Client.DiscoveryWeb.OIDC.Client.CodeFlowWeb.OIDC.Client.InternaldiscoverWeb.OIDC.Client SessionStoresessionStoreGeneratesessionStoreSavesessionStoreGetsessionStoreDeleteOpenIdExceptionDiscoveryExceptionInternalHttpException JsonException UnsecuredJwt JwtExceptoinValidationExceptionCode ParametersNonceStateScope ScopeValueIssuerLocationopenIdprofileemailaddressphone offlineAccess$fExceptionOpenIdException$fShowOpenIdException ConfigurationissuerauthorizationEndpoint tokenEndpointuserinfoEndpointrevocationEndpointjwksUriresponseTypesSupportedsubjectTypesSupported idTokenSigningAlgValuesSupportedscopesSupported!tokenEndpointAuthMethodsSupportedclaimsSupported JwsAlgJson Unsupported getJwsAlgProvider configurationjwkSet$fFromJSONJwsAlgJson$fShowJwsAlgJson$fEqJwsAlgJson$fShowConfiguration$fEqConfiguration$fFromJSONConfigurationOIDCoidcAuthorizationServerUrloidcTokenEndpoint oidcClientIdoidcClientSecretoidcRedirectUri oidcProviderdefnewOIDCsetCredentials IdTokenClaimsisssubaudexpiatnonce otherClaimsTokens accessToken tokenTypeidToken expiresIn refreshTokenvalidateIdToken$fFromJSONIdTokenClaims$fShowIdTokenClaims$fEqIdTokenClaims$fGenericIdTokenClaims $fShowTokens $fEqTokensprepareAuthenticationRequestUrlgetValidIdTokenClaimsgetAuthenticationRequestUrlgooglegenerateDiscoveryUrlgetValidTokens requestTokensvalidateClaimsgetCurrentIntDateTokensResponse textToIntrethrowparseUrl%jose-jwt-0.8.0-KXVY8YZ1AiBBMTY6wSvaGa Jose.Types parseHeader encodeHeader defJweHdr defJwsHdr JwtHeaderJweHJwsH UnsecuredHIntDateJose.Jwt decodeClaimsdecodeencodeJwtunJwtPayloadNestedClaimsJwsJwe JwtContent Unsecured JwtEncoding JwsEncoding JweEncodingKeyIdUTCKeyId JwsHeaderjwsAlgjwsTypjwsCtyjwsKid JweHeaderjweAlgjweEncjweTypjweCtyjweZipjweKid JwtClaimsjwtIssjwtSubjwtAudjwtExpjwtNbfjwtIatjwtJtiJwtErrorKeyError BadAlgorithmBadDots BadHeader BadClaims BadSignature BadCrypto Base64Error