Îõ³h*¶ùê      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi 0.8.0.0 krdlab@gmail.com experimental Safe-Inferred"7î oidc-client#Manages state and nonce. (Maybe OIDC should have them) oidc-client"Generate state and nonce at random oidc-clientReturns j if  is unknown oidc-clientShould delete at least nonce   krdlab@gmail.com experimental Safe-Inferred"m klmnopqrstkrdlab@gmail.com experimental Safe-Inferred"ä# oidc-client An OpenID Provider Configuration1 oidc-clientAn OpenID Provider information1234 !"#$%&'()*+,-./01234 !"#$%&'()*+,-./0krdlab@gmail.com experimental Safe-Inferred"Å; oidc-clientÀThis data type represents information needed in the OpenID flow.D oidc-clientOP's information (obtained by  )E oidc-client client ID oidc-client client secret oidc-clientÓredirect URI (the HTTP endpont on your server that will receive a response from OP) ;<=>?@ABCDE ;<=>?@ABCDEkrdlab@gmail.com experimental Safe-Inferred"<ä×F oidc-clientClaims required for an  =https://openid.net/specs/openid-connect-core-1_0.html#IDTokenID Token=, plus recommended claims (nonce) and other custom claims.OPQRSUVTFGKIMHJLNWOPQRSUVTFGKIMHJLNWkrdlab@gmail.com experimental Safe-Inferred" ž^ oidc-clientÉMake URL for Authorization Request after generating state and nonce from ._ oidc-clientÄGet and validate access token and with code and state stored in the ". Then deletes session info by .` oidc-client#Make URL for Authorization Request.^ oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-clientOptional parameters` oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-client1used for CSRF mitigation. (recommended parameter) oidc-clientOptional parameters`_^`_^krdlab@gmail.com experimental Safe-Inferred" aakrdlab@gmail.com experimental Safe-Inferred" Òb oidc-clientÀThis function obtains OpenID Provider configuration and JWK set.b oidc-client!OpenID Provider's Issuer locationba1234 !"#$%&'()*+,cba1234 !"#$%&'()*+,ckrdlab@gmail.com experimental Safe-Inferred"ád oidc-clientÉMake URL for Authorization Request after generating state and nonce from .e oidc-clientÄGet and validate access token and with code and state stored in the ". Then deletes session info by .f oidc-client#Make URL for Authorization Request.g oidc-clientRequest and validate tokens.úThis function requests ID Token and Access Token to a OP's token endpoint, and validates the received ID Token. Returned O value is a valid.ÕIf a HTTP error has occurred or a tokens validation has failed, this function throws .d oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-clientOptional parametersf oidc-client?used to specify what are privileges requested for tokens. (use  ScopeValue) oidc-client1used for CSRF mitigation. (recommended parameter) oidc-clientOptional parametersfedghifedghi krdlab@gmail.com experimental Safe-Inferred1Œ1234 !"#$%&'()*+,bac;DEOPQRSUVTFGKIMHJLNWfedghi uvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ¡¢£€¥Š§š©ª«¬­®¯°±²³;DEŽ   !"#$%&'()*++,-./01234567889:;;<=>?@ABCDDEFGHIJKLMNNOPQRSTUVVWXYZ[\]^_`abcdefg hdifjklmno p \ [ Y X W p q r stuvtuwtuxtuytuztu{tu|tu}tu~tututu€tutu‚tuƒtu„tu…tu†tu‡tu‡tuˆtu‰tuŠtu‹tuŒtutuŽtuŽtututu‘tu’tu“tu“tu”tu•tu–tu—tu˜tu™tuštu›tuštu›tuœtutužtuŸtuŸtu tu¡tu¢tu£tu€tu¥tu¥tЧtŠštu©tŠªtu«tu¬tu­®*oidc-client-0.8.0.0-HA40nNSwdXMEdgOT3SteeCWeb.OIDC.Client.Types"Web.OIDC.Client.Discovery.ProviderWeb.OIDC.Client.SettingsWeb.OIDC.Client.TokensWeb.OIDC.Client.IdTokenFlow!Web.OIDC.Client.Discovery.IssuersWeb.OIDC.Client.DiscoveryWeb.OIDC.Client.CodeFlow oidc-clientWeb.OIDC.Client.InternaldiscoverWeb.OIDC.Client SessionStoresessionStoreGeneratesessionStoreSavesessionStoreGetsessionStoreDeleteOpenIdExceptionDiscoveryExceptionInternalHttpException JsonException UnsecuredJwt JwtExceptionValidationException UnknownStateMissingNonceInResponseMismatchedNoncesCode ParametersNonceStateScope ScopeValueIssuerLocationopenIdprofileemailaddressphone offlineAccess$fExceptionOpenIdException$fShowOpenIdException ConfigurationissuerauthorizationEndpoint tokenEndpointuserinfoEndpointrevocationEndpointjwksUriresponseTypesSupportedsubjectTypesSupported idTokenSigningAlgValuesSupportedscopesSupported!tokenEndpointAuthMethodsSupportedclaimsSupported JwsAlgJson Unsupported getJwsAlgProvider configurationjwkSet$fFromJSONJwsAlgJson$fShowConfiguration$fEqConfiguration$fShowJwsAlgJson$fEqJwsAlgJson$fFromJSONConfigurationOIDCoidcAuthorizationServerUrloidcTokenEndpoint oidcClientIdoidcClientSecretoidcRedirectUri oidcProviderdefnewOIDCsetCredentials IdTokenClaimsisssubaudexpiatnonce otherClaimsTokens accessToken tokenTypeidToken idTokenJwt expiresIn refreshTokenvalidateIdToken$fFromJSONIdTokenClaims $fShowTokens $fEqTokens$fShowIdTokenClaims$fEqIdTokenClaims$fGenericIdTokenClaimsprepareAuthenticationRequestUrlgetValidIdTokenClaimsgetAuthenticationRequestUrlgooglegenerateDiscoveryUrlgetValidTokens requestTokensvalidateClaimsgetCurrentIntDatebase GHC.MaybeNothingTokensResponse textToIntrethrowparseUrl%jose-jwt-0.9.6-DP0eg2xoIfPIqAPzDqwREP Jose.TypesJwtErrorKeyError BadAlgorithmBadDots BadHeader BadClaims BadSignature BadCrypto Base64Error JwtClaimsjwtIssjwtSubjwtAudjwtExpjwtNbfjwtIatjwtJti JweHeaderjweAlgjweEncjweTypjweCtyjweZipjweKid JwsHeaderjwsAlgjwsTypjwsCtyjwsKidKeyIdUTCKeyId JwtEncoding JwsEncoding JweEncoding JwtContent UnsecuredJwsJwePayloadNestedClaimsJwtunJwt JwtHeaderJweHJwsH UnsecuredHIntDateJose.Jwtdecodeencode encodeHeader decodeClaims parseHeader defJwsHdr defJweHdr