h$F      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdef krdlab@gmail.com experimentalNone 3 oidc-client#Manages state and nonce. (Maybe OIDC should have them) oidc-client"Generate state and nonce at random oidc-clientShould delete at least nonce    krdlab@gmail.com experimentalNone  ghijklmnopkrdlab@gmail.com experimentalNone  oidc-client An OpenID Provider Configuration. oidc-clientAn OpenID Provider information !"#$%&'()*+,-./01./01 !"#$%&'()*+,-krdlab@gmail.com experimentalNone O8 oidc-clientThis data type represents information needed in the OpenID flow.A oidc-clientOP's information (obtained by  )B oidc-client client ID oidc-client client secret oidc-clientredirect URI (the HTTP endpont on your server that will receive a response from OP) 89:;<=>?@AB 89:;<=>?@ABkrdlab@gmail.com experimentalNone 8XC oidc-clientClaims required for an  =https://openid.net/specs/openid-connect-core-1_0.html#IDTokenID Token=, plus recommended claims (nonce) and other custom claims.CDHFJEGIKLMNOPRSQTLMNOPRSQCDHFJEGIKTkrdlab@gmail.com experimentalNone 0[ oidc-clientMake URL for Authorization Request after generating state and nonce from .\ oidc-clientGet and validate access token and with code and state stored in the ". Then deletes session info by .] oidc-client#Make URL for Authorization Request.[ oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-clientOptional parameters] oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-client1used for CSRF mitigation. (recommended parameter) oidc-clientOptional parameters[\]]\[krdlab@gmail.com experimentalNone r^^krdlab@gmail.com experimentalNone 8_ oidc-clientThis function obtains OpenID Provider configuration and JWK set._ oidc-client!OpenID Provider's Issuer location !"#$%&'()./01^_`_^./01 !"#$%&'()`krdlab@gmail.com experimentalNone >a oidc-clientMake URL for Authorization Request after generating state and nonce from .b oidc-clientGet and validate access token and with code and state stored in the ". Then deletes session info by .c oidc-client#Make URL for Authorization Request.d oidc-clientRequest and validate tokens.This function requests ID Token and Access Token to a OP's token endpoint, and validates the received ID Token. Returned L value is a valid.If a HTTP error has occurred or a tokens validation has failed, this function throws .a oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-clientOptional parametersc oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-client1used for CSRF mitigation. (recommended parameter) oidc-clientOptional parametersabcdefcbadef krdlab@gmail.com experimentalNoneqrstuvwxyz{|}~  )('&%$#"! ./018ABCDKIGEJHFLMQSRPNOT^_`abcdef8AB    !"#$%&''()*+,-./012344567789:;<=>?@@ABCDEFGHIJJKLMNOPQRRSTUVWXYZ[\]^_`abc d`ebfgh i i X W U T S j k lmnomnpmnqmnrmnsmntmnumnvmnwmnwmxymxzmx{mn|mn|mn}mn~mnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmnmn*oidc-client-0.6.0.0-35fADd6K7bkJMvWaj82RrcWeb.OIDC.Client.Types"Web.OIDC.Client.Discovery.ProviderWeb.OIDC.Client.SettingsWeb.OIDC.Client.TokensWeb.OIDC.Client.IdTokenFlow!Web.OIDC.Client.Discovery.IssuersWeb.OIDC.Client.DiscoveryWeb.OIDC.Client.CodeFlowWeb.OIDC.Client.InternaldiscoverWeb.OIDC.Client SessionStoresessionStoreGeneratesessionStoreSavesessionStoreGetsessionStoreDeleteOpenIdExceptionDiscoveryExceptionInternalHttpException JsonException UnsecuredJwt JwtExceptionValidationExceptionCode ParametersNonceStateScope ScopeValueIssuerLocationopenIdprofileemailaddressphone offlineAccess$fExceptionOpenIdException$fShowOpenIdException ConfigurationissuerauthorizationEndpoint tokenEndpointuserinfoEndpointrevocationEndpointjwksUriresponseTypesSupportedsubjectTypesSupported idTokenSigningAlgValuesSupportedscopesSupported!tokenEndpointAuthMethodsSupportedclaimsSupported JwsAlgJson Unsupported getJwsAlgProvider configurationjwkSet$fFromJSONJwsAlgJson$fShowConfiguration$fEqConfiguration$fShowJwsAlgJson$fEqJwsAlgJson$fFromJSONConfigurationOIDCoidcAuthorizationServerUrloidcTokenEndpoint oidcClientIdoidcClientSecretoidcRedirectUri oidcProviderdefnewOIDCsetCredentials IdTokenClaimsisssubaudexpiatnonce otherClaimsTokens accessToken tokenTypeidToken idTokenJwt expiresIn refreshTokenvalidateIdToken$fFromJSONIdTokenClaims $fShowTokens $fEqTokens$fShowIdTokenClaims$fEqIdTokenClaims$fGenericIdTokenClaimsprepareAuthenticationRequestUrlgetValidIdTokenClaimsgetAuthenticationRequestUrlgooglegenerateDiscoveryUrlgetValidTokens requestTokensvalidateClaimsgetCurrentIntDateTokensResponse textToIntrethrowparseUrl%jose-jwt-0.8.0-9jJaZtsZbBMKMU78sZIUkS Jose.Types parseHeader encodeHeader defJweHdr defJwsHdr JwtHeader UnsecuredHJweHJwsHIntDateJose.Jwt decodeClaimsdecodeencodeJwtunJwtPayloadNestedClaimsJwsJwe JwtContent Unsecured JwtEncoding JwsEncoding JweEncodingKeyIdUTCKeyId JwsHeaderjwsKidjwsCtyjwsAlgjwsTyp JweHeaderjweKidjweZipjweCtyjweTypjweAlgjweEnc JwtClaimsjwtJtijwtIatjwtNbfjwtExpjwtAudjwtIssjwtSubJwtError Base64Error BadCrypto BadSignature BadClaims BadHeaderBadDotsKeyError BadAlgorithm