SYMBOL INDEX (662 symbols across 34 files) FILE: examples/gitlab.rs type GitLabClaims (line 38) | struct GitLabClaims { function handle_error (line 45) | fn handle_error(fail: &T, msg: &'static str) { function main (line 56) | fn main() { FILE: examples/google.rs function handle_error (line 37) | fn handle_error(fail: &T, msg: &'static str) { type RevocationEndpointProviderMetadata (line 52) | struct RevocationEndpointProviderMetadata { type GoogleProviderMetadata (line 56) | type GoogleProviderMetadata = ProviderMetadata< function main (line 71) | fn main() { FILE: examples/okta_device_grant.rs type DeviceEndpointProviderMetadata (line 36) | struct DeviceEndpointProviderMetadata { type DeviceProviderMetadata (line 40) | type DeviceProviderMetadata = ProviderMetadata< function handle_error (line 55) | fn handle_error(fail: &T, msg: &'static str) { function main (line 66) | fn main() -> Result<(), anyhow::Error> { FILE: src/authorization.rs type AuthenticationFlow (line 18) | pub enum AuthenticationFlow { type AuthorizationRequest (line 42) | pub struct AuthorizationRequest<'a, AD, P, RT> function add_scope (line 67) | pub fn add_scope(mut self, scope: Scope) -> Self { function add_scopes (line 73) | pub fn add_scopes(mut self, scopes: I) -> Self function add_extra_param (line 94) | pub fn add_extra_param(mut self, name: N, value: V) -> Self function set_pkce_challenge (line 109) | pub fn set_pkce_challenge(mut self, pkce_code_challenge: PkceCodeChallen... function add_auth_context_value (line 119) | pub fn add_auth_context_value(mut self, acr_value: AuthenticationContext... function add_claims_locale (line 127) | pub fn add_claims_locale(mut self, claims_locale: LanguageTag) -> Self { function set_display (line 137) | pub fn set_display(mut self, display: AD) -> Self { function set_id_token_hint (line 149) | pub fn set_id_token_hint( function set_login_hint (line 166) | pub fn set_login_hint(mut self, login_hint: LoginHint) -> Self { function set_max_age (line 175) | pub fn set_max_age(mut self, max_age: Duration) -> Self { function add_prompt (line 182) | pub fn add_prompt(mut self, prompt: P) -> Self { function add_ui_locale (line 191) | pub fn add_ui_locale(mut self, ui_locale: LanguageTag) -> Self { function set_redirect_uri (line 197) | pub fn set_redirect_uri(mut self, redirect_url: Cow<'a, RedirectUrl>) ->... function url (line 204) | pub fn url(self) -> (Url, CsrfToken, Nonce) { function new_client (line 278) | fn new_client() -> CoreClient< function test_authorize_url_minimal (line 298) | fn test_authorize_url_minimal() { function test_authorize_url_implicit_with_access_token (line 317) | fn test_authorize_url_implicit_with_access_token() { function test_authorize_url_hybrid (line 336) | fn test_authorize_url_hybrid() { function test_authorize_url_full (line 358) | fn test_authorize_url_full() { function test_authorize_url_redirect_url_override (line 469) | fn test_authorize_url_redirect_url_override() { FILE: src/claims.rs type AdditionalClaims (line 22) | pub trait AdditionalClaims: Debug + DeserializeOwned + Serialize + 'stat... type EmptyAdditionalClaims (line 28) | pub struct EmptyAdditionalClaims {} type AddressClaim (line 34) | pub struct AddressClaim { type GenderClaim (line 59) | pub trait GenderClaim: Clone + Debug + DeserializeOwned + Serialize + 's... type StandardClaims (line 63) | pub struct StandardClaims function new (line 96) | pub fn new(subject: SubjectIdentifier) -> Self { function subject (line 123) | pub fn subject(&self) -> &SubjectIdentifier { function set_subject (line 128) | pub fn set_subject(mut self, subject: SubjectIdentifier) -> Self { method should_include (line 166) | fn should_include(field_name: &str) -> bool { function deserialize (line 199) | fn deserialize(deserializer: D) -> Result method serialize (line 349) | fn serialize(&self, serializer: SE) -> Result function test_null_optional_claims (line 391) | fn test_null_optional_claims() { function expect_err_prefix (line 423) | fn expect_err_prefix( function test_duplicate_claims (line 437) | fn test_duplicate_claims() { function test_err_field_name (line 472) | fn test_err_field_name() { FILE: src/client.rs constant OPENID_SCOPE (line 18) | const OPENID_SCOPE: &str = "openid"; type Client (line 93) | pub struct Client< function new (line 189) | pub fn new(client_id: ClientId, issuer: IssuerUrl, jwks: JsonWebKeySet( function set_auth_type (line 349) | pub fn set_auth_type(mut self, auth_type: AuthType) -> Self { function auth_type (line 356) | pub fn auth_type(&self) -> &AuthType { function set_auth_uri (line 366) | pub fn set_auth_uri( function client_id (line 402) | pub fn client_id(&self) -> &ClientId { function set_client_secret (line 411) | pub fn set_client_secret(mut self, client_secret: ClientSecret) -> Self { function set_device_authorization_url (line 422) | pub fn set_device_authorization_url( function set_introspection_url (line 462) | pub fn set_introspection_url( function set_redirect_uri (line 498) | pub fn set_redirect_uri(mut self, redirect_url: RedirectUrl) -> Self { function redirect_uri (line 504) | pub fn redirect_uri(&self) -> Option<&RedirectUrl> { function set_revocation_url (line 511) | pub fn set_revocation_url( function set_token_uri (line 552) | pub fn set_token_uri( function set_user_info_url (line 590) | pub fn set_user_info_url( function enable_openid_scope (line 629) | pub fn enable_openid_scope(mut self) -> Self { function disable_openid_scope (line 635) | pub fn disable_openid_scope(mut self) -> Self { function id_token_verifier (line 642) | pub fn id_token_verifier(&self) -> IdTokenVerifier { function auth_uri (line 725) | pub fn auth_uri(&self) -> &AuthUrl { function authorize_url (line 760) | pub fn authorize_url( function exchange_client_credentials (line 855) | pub fn exchange_client_credentials(&self) -> ClientCredentialsTokenReque... function exchange_code (line 868) | pub fn exchange_code(&self, code: AuthorizationCode) -> CodeTokenRequest... function exchange_device_access_token (line 878) | pub fn exchange_device_access_token<'a, EF>( function exchange_password (line 895) | pub fn exchange_password<'a>( function exchange_refresh_token (line 910) | pub fn exchange_refresh_token<'a>( function token_uri (line 918) | pub fn token_uri(&self) -> &TokenUrl { function exchange_client_credentials (line 987) | pub fn exchange_client_credentials( function exchange_code (line 1002) | pub fn exchange_code( function exchange_device_access_token (line 1015) | pub fn exchange_device_access_token<'a, EF>( function exchange_password (line 1031) | pub fn exchange_password<'a>( function exchange_refresh_token (line 1045) | pub fn exchange_refresh_token<'a>( function token_uri (line 1053) | pub fn token_uri(&self) -> Option<&TokenUrl> { function exchange_device_code (line 1124) | pub fn exchange_device_code(&self) -> DeviceAuthorizationRequest { function device_authorization_url (line 1137) | pub fn device_authorization_url(&self) -> &DeviceAuthorizationUrl { function introspect (line 1205) | pub fn introspect<'a>(&'a self, token: &'a AccessToken) -> Introspection... function introspection_url (line 1210) | pub fn introspection_url(&self) -> &IntrospectionUrl { function revoke_token (line 1278) | pub fn revoke_token( function revocation_url (line 1288) | pub fn revocation_url(&self) -> &RevocationUrl { function user_info (line 1362) | pub fn user_info( function user_info_url (line 1373) | pub fn user_info_url(&self) -> &UserInfoUrl { function user_info (line 1450) | pub fn user_info( function user_info_url (line 1467) | pub fn user_info_url(&self) -> Option<&UserInfoUrl> { FILE: src/core/crypto.rs function rsa_public_key (line 8) | fn rsa_public_key( function ec_public_key (line 26) | fn ec_public_key( function ed_public_key (line 55) | fn ed_public_key( function verify_rsa_signature (line 73) | pub fn verify_rsa_signature( function verify_ec_signature (line 100) | pub fn verify_ec_signature( function verify_ed_signature (line 149) | pub fn verify_ed_signature( function test_leading_zeros_are_parsed_correctly (line 190) | fn test_leading_zeros_are_parsed_correctly() { FILE: src/core/jwk/mod.rs type CoreJsonWebKey (line 29) | pub struct CoreJsonWebKey { method new_rsa (line 73) | pub fn new_rsa(n: Vec, e: Vec, kid: Option) -> S... method new_ec (line 93) | pub fn new_ec( method new_okp (line 119) | pub fn new_okp(x: Vec, crv: CoreJsonCurveType, kid: Option Option<&JsonWebKeyId> { method key_type (line 142) | fn key_type(&self) -> &CoreJsonWebKeyType { method key_use (line 145) | fn key_use(&self) -> Option<&CoreJsonWebKeyUse> { method signing_alg (line 149) | fn signing_alg(&self) -> JsonWebKeyAlgorithm<&CoreJwsSigningAlgorithm> { method new_symmetric (line 157) | fn new_symmetric(key: Vec) -> Self { method verify_signature (line 173) | fn verify_signature( method hash_bytes (line 348) | fn hash_bytes(&self, bytes: &[u8], alg: &Self::SigningAlgorithm) -> Resu... type CoreHmacKey (line 397) | pub struct CoreHmacKey { method new (line 402) | pub fn new(secret: T) -> Self type VerificationKey (line 412) | type VerificationKey = CoreJsonWebKey; method sign (line 414) | fn sign( method as_verification_key (line 453) | fn as_verification_key(&self) -> CoreJsonWebKey { type EdDsaSigningKey (line 458) | enum EdDsaSigningKey { method from_ed25519_pem (line 463) | fn from_ed25519_pem(pem: &str) -> Result { method sign (line 469) | fn sign(&self, message: &[u8]) -> Vec { type CoreEdDsaPrivateSigningKey (line 484) | pub struct CoreEdDsaPrivateSigningKey { method from_ed25519_pem (line 490) | pub fn from_ed25519_pem(pem: &str, kid: Option) -> Resul... type VerificationKey (line 498) | type VerificationKey = CoreJsonWebKey; method sign (line 500) | fn sign( method as_verification_key (line 518) | fn as_verification_key(&self) -> CoreJsonWebKey { type RngClone (line 541) | pub(crate) trait RngClone: dyn_clone::DynClone + rand::RngCore + rand::C... type CoreRsaPrivateSigningKey (line 549) | pub struct CoreRsaPrivateSigningKey { method from_pem (line 556) | pub fn from_pem(pem: &str, kid: Option) -> Result CoreJsonWebKey { type CoreJsonWebKeyType (line 690) | pub enum CoreJsonWebKeyType { type CoreJsonCurveType (line 711) | pub enum CoreJsonCurveType { type CoreJsonWebKeyUse (line 729) | pub enum CoreJsonWebKeyUse { method from_str (line 740) | fn from_str(s: &str) -> Self { method as_ref (line 749) | fn as_ref(&self) -> &str { method allows_signature (line 758) | fn allows_signature(&self) -> bool { method allows_encryption (line 761) | fn allows_encryption(&self) -> bool { FILE: src/core/jwk/tests.rs function test_core_jwk_deserialization_rsa (line 21) | fn test_core_jwk_deserialization_rsa() { function test_core_jwk_deserialization_ec (line 61) | fn test_core_jwk_deserialization_ec() { function test_core_jwk_deserialization_ed (line 95) | fn test_core_jwk_deserialization_ed() { function test_core_jwk_deserialization_symmetric (line 119) | fn test_core_jwk_deserialization_symmetric() { function test_core_jwk_deserialization_no_optional (line 147) | fn test_core_jwk_deserialization_no_optional() { function test_core_jwk_deserialization_unrecognized (line 159) | fn test_core_jwk_deserialization_unrecognized() { function test_core_jwk_deserialization_dupe_fields (line 170) | fn test_core_jwk_deserialization_dupe_fields() { function verify_signature (line 191) | fn verify_signature( function verify_invalid_signature (line 215) | fn verify_invalid_signature( function test_eddsa_verification (line 234) | fn test_eddsa_verification() { function test_ecdsa_verification (line 291) | fn test_ecdsa_verification() { function test_rsa_pkcs1_verification (line 379) | fn test_rsa_pkcs1_verification() { function test_rsa_pss_verification (line 497) | fn test_rsa_pss_verification() { function test_hmac_sha256_verification (line 546) | fn test_hmac_sha256_verification() { function expect_hmac (line 587) | fn expect_hmac( function test_hmac_signing (line 603) | fn test_hmac_signing() { constant TEST_ED25519_KEY (line 670) | const TEST_ED25519_KEY: &str = "\ constant TEST_RSA_KEY (line 677) | const TEST_RSA_KEY: &str = "\ function expect_ed_sig (line 707) | fn expect_ed_sig( function expect_rsa_sig (line 720) | fn expect_rsa_sig( type TestRng (line 734) | struct TestRng(StepRng); method next_u32 (line 738) | fn next_u32(&mut self) -> u32 { method next_u64 (line 741) | fn next_u64(&mut self) -> u64 { method fill_bytes (line 744) | fn fill_bytes(&mut self, dest: &mut [u8]) { method try_fill_bytes (line 747) | fn try_fill_bytes(&mut self, dest: &mut [u8]) -> Result<(), rand_core::E... function test_ed_signing (line 753) | fn test_ed_signing() { function test_rsa_signing (line 794) | fn test_rsa_signing() { function test_rsa_pss_signing (line 912) | fn test_rsa_pss_signing() { function test_jwks_unsupported_key (line 936) | fn test_jwks_unsupported_key() { function test_jwks_unsupported_alg (line 989) | fn test_jwks_unsupported_alg() { function test_jwks_same_kid_different_alg (line 1018) | fn test_jwks_same_kid_different_alg() { function test_hash_bytes_eddsa (line 1075) | fn test_hash_bytes_eddsa() { function test_hash_bytes_rsa (line 1097) | fn test_hash_bytes_rsa() { FILE: src/core/mod.rs type CoreDeviceAuthorizationResponse (line 43) | pub type CoreDeviceAuthorizationResponse = type CoreTokenIntrospectionResponse (line 47) | pub type CoreTokenIntrospectionResponse = type CoreAuthenticationFlow (line 51) | pub type CoreAuthenticationFlow = AuthenticationFlow; type CoreClient (line 54) | pub type CoreClient< type CoreClientMetadata (line 82) | pub type CoreClientMetadata = ClientMetadata< type CoreClientRegistrationRequest (line 95) | pub type CoreClientRegistrationRequest = ClientRegistrationRequest< type CoreClientRegistrationResponse (line 110) | pub type CoreClientRegistrationResponse = ClientRegistrationResponse< type CoreIdToken (line 124) | pub type CoreIdToken = IdToken< type CoreIdTokenClaims (line 132) | pub type CoreIdTokenClaims = IdTokenClaims = IdTokenVerifier<'a, CoreJsonWebKey>; type CoreTokenResponse (line 147) | pub type CoreTokenResponse = StandardTokenResponse; type CoreProviderMetadata (line 153) | pub type CoreProviderMetadata = ProviderMetadata< type CoreUserInfoClaims (line 169) | pub type CoreUserInfoClaims = UserInfoClaims = type CoreApplicationType (line 189) | pub enum CoreApplicationType { method from_str (line 206) | fn from_str(s: &str) -> Self { method as_ref (line 215) | fn as_ref(&self) -> &str { type CoreAuthDisplay (line 231) | pub enum CoreAuthDisplay { method from_str (line 253) | fn from_str(s: &str) -> Self { method as_ref (line 264) | fn as_ref(&self) -> &str { method fmt (line 276) | fn fmt(&self, f: &mut std::fmt::Formatter) -> Result<(), std::fmt::Error> { type CoreAuthPrompt (line 287) | pub enum CoreAuthPrompt { method from_str (line 315) | fn from_str(s: &str) -> Self { method as_ref (line 326) | fn as_ref(&self) -> &str { method fmt (line 339) | fn fmt(&self, f: &mut std::fmt::Formatter) -> Result<(), std::fmt::Error> { type CoreClaimType (line 356) | pub enum CoreClaimType { method from_str (line 378) | fn from_str(s: &str) -> Self { method as_ref (line 388) | fn as_ref(&self) -> &str { type CoreClientAuthMethod (line 401) | pub enum CoreClientAuthMethod { method from_str (line 422) | fn from_str(s: &str) -> Self { method as_ref (line 434) | fn as_ref(&self) -> &str { type CoreGrantType (line 459) | pub enum CoreGrantType { method from_str (line 480) | fn from_str(s: &str) -> Self { method as_ref (line 494) | fn as_ref(&self) -> &str { type CoreJweContentEncryptionAlgorithm (line 516) | pub enum CoreJweContentEncryptionAlgorithm { type KeyType (line 537) | type KeyType = CoreJsonWebKeyType; method key_type (line 539) | fn key_type(&self) -> Result { type CoreJweKeyManagementAlgorithm (line 552) | pub enum CoreJweKeyManagementAlgorithm { type CoreJwsSigningAlgorithm (line 615) | pub enum CoreJwsSigningAlgorithm { type KeyType (line 668) | type KeyType = CoreJsonWebKeyType; method key_type (line 670) | fn key_type(&self) -> Option { method uses_shared_secret (line 689) | fn uses_shared_secret(&self) -> bool { method rsa_sha_256 (line 695) | fn rsa_sha_256() -> Self { type CoreAuthErrorResponseType (line 710) | pub enum CoreAuthErrorResponseType { method from_str (line 765) | fn from_str(s: &str) -> Self { method as_ref (line 788) | fn as_ref(&self) -> &str { type CoreRegisterErrorResponseType (line 813) | pub enum CoreRegisterErrorResponseType { method from_str (line 826) | fn from_str(s: &str) -> Self { method as_ref (line 835) | fn as_ref(&self) -> &str { method fmt (line 846) | fn fmt(&self, f: &mut std::fmt::Formatter) -> Result<(), std::fmt::Error> { type CoreResponseMode (line 864) | pub enum CoreResponseMode { method from_str (line 895) | fn from_str(s: &str) -> Self { method as_ref (line 905) | fn as_ref(&self) -> &str { type CoreResponseType (line 924) | pub enum CoreResponseType { method from_str (line 951) | fn from_str(s: &str) -> Self { method as_ref (line 962) | fn as_ref(&self) -> &str { method to_oauth2 (line 973) | fn to_oauth2(&self) -> OAuth2ResponseType { type CoreSubjectIdentifierType (line 986) | pub enum CoreSubjectIdentifierType { method from_str (line 999) | fn from_str(s: &str) -> Self { method as_ref (line 1008) | fn as_ref(&self) -> &str { function base64_url_safe_no_pad (line 1018) | pub(crate) fn base64_url_safe_no_pad() -> GeneralPurpose { FILE: src/core/tests.rs function test_grant_type_serialize (line 4) | fn test_grant_type_serialize() { function test_signature_alg_serde_plain (line 14) | fn test_signature_alg_serde_plain() { FILE: src/discovery/mod.rs constant CONFIG_URL_SUFFIX (line 25) | const CONFIG_URL_SUFFIX: &str = ".well-known/openid-configuration"; type AdditionalProviderMetadata (line 28) | pub trait AdditionalProviderMetadata: Clone + Debug + DeserializeOwned +... type EmptyAdditionalProviderMetadata (line 34) | pub struct EmptyAdditionalProviderMetadata {} type ProviderMetadata (line 43) | pub struct ProviderMetadata function new (line 172) | pub fn new( function discover (line 277) | pub fn discover( function discover_async (line 308) | pub fn discover_async<'c, C>( function discovery_request (line 342) | fn discovery_request(discovery_url: url::Url) -> Result( function additional_metadata (line 395) | pub fn additional_metadata(&self) -> &A { function additional_metadata_mut (line 399) | pub fn additional_metadata_mut(&mut self) -> &mut A { type DiscoveryError (line 407) | pub enum DiscoveryError FILE: src/discovery/tests.rs function test_discovery_deserialization (line 12) | fn test_discovery_deserialization() { function test_discovery_deserialization_other_fields (line 743) | fn test_discovery_deserialization_other_fields() { function test_unsupported_enum_values (line 976) | fn test_unsupported_enum_values() { FILE: src/helpers.rs function deserialize_string_or_vec (line 16) | pub(crate) fn deserialize_string_or_vec<'de, T, D>(deserializer: D) -> R... function deserialize_string_or_vec_opt (line 31) | pub(crate) fn deserialize_string_or_vec_opt<'de, T, D>( function deserialize_option_or_none (line 53) | pub(crate) fn deserialize_option_or_none<'de, T, D>(deserializer: D) -> ... type DeserializeMapField (line 65) | pub trait DeserializeMapField: Sized { method deserialize_map_field (line 66) | fn deserialize_map_field<'de, V>( method deserialize_map_field (line 80) | fn deserialize_map_field<'de, V>( method deserialize_map_field (line 109) | fn deserialize_map_field<'de, V>( function deserialize (line 146) | pub fn deserialize<'de, D>(deserializer: D) -> Result function serialize_space_delimited_vec (line 182) | pub(crate) fn serialize_space_delimited_vec( type FlattenFilter (line 199) | pub(crate) trait FlattenFilter { method should_include (line 200) | fn should_include(field_name: &str) -> bool; type FilteredFlatten (line 209) | pub(crate) struct FilteredFlatten function from (line 227) | fn from(value: T) -> Self { function as_ref (line 239) | fn as_ref(&self) -> &T { function as_mut (line 248) | fn as_mut(&mut self) -> &mut T { method eq (line 257) | fn eq(&self, other: &Self) -> bool { method clone (line 266) | fn clone(&self) -> Self { method fmt (line 281) | fn fmt(&self, f: &mut Formatter) -> FormatterResult { function deserialize (line 291) | fn deserialize(deserializer: D) -> Result type Flatten (line 334) | struct Flatten function as_ref (line 345) | fn as_ref(&self) -> &T { function as_mut (line 353) | fn as_mut(&mut self) -> &mut T { method eq (line 361) | fn eq(&self, other: &Self) -> bool { method fmt (line 370) | fn fmt(&self, f: &mut Formatter) -> FormatterResult { function join_vec (line 375) | pub(crate) fn join_vec(entries: &[T]) -> String type Boolean (line 389) | pub(crate) struct Boolean( method into_inner (line 397) | pub(crate) fn into_inner(self) -> bool { method fmt (line 402) | fn fmt(&self, f: &mut Formatter) -> Result<(), std::fmt::Error> { type Timestamp (line 410) | pub(crate) enum Timestamp { method from_utc (line 419) | pub(crate) fn from_utc(utc: &DateTime) -> Self { method to_utc (line 423) | pub(crate) fn to_utc(&self) -> Result, ()> { method deserialize_as (line 458) | fn deserialize_as(deserializer: D) -> Result, D::Error> method serialize_as (line 473) | fn serialize_as(source: &DateTime, serializer: S) -> Result Result<(), std::fmt::Error> { function deserialize (line 498) | pub fn deserialize<'de, D>(deserializer: D) -> Result, D::Error> function serialize (line 515) | pub fn serialize(v: &[u8], serializer: S) -> Result FILE: src/http_utils.rs constant MIME_TYPE_JSON (line 5) | pub const MIME_TYPE_JSON: &str = "application/json"; constant MIME_TYPE_JWKS (line 6) | pub const MIME_TYPE_JWKS: &str = "application/jwk-set+json"; constant MIME_TYPE_JWT (line 7) | pub const MIME_TYPE_JWT: &str = "application/jwt"; constant BEARER (line 9) | pub const BEARER: &str = "Bearer"; function content_type_has_essence (line 13) | pub fn content_type_has_essence(content_type: &HeaderValue, expected_ess... function check_content_type (line 24) | pub fn check_content_type(headers: &HeaderMap, expected_content_type: &s... function auth_bearer (line 45) | pub fn auth_bearer(access_token: &AccessToken) -> (HeaderName, HeaderVal... FILE: src/id_token/mod.rs type IdToken (line 37) | pub struct IdToken< type Err (line 54) | type Err = serde_json::Error; method from_str (line 55) | fn from_str(s: &str) -> Result { function new (line 73) | pub fn new( function claims (line 113) | pub fn claims<'a, K, N>( function into_claims (line 126) | pub fn into_claims( function signing_alg (line 142) | pub fn signing_alg(&self) -> Result<&JS, SignatureVerificationError> { function signing_key (line 163) | pub fn signing_key<'s, K>( method to_string (line 182) | fn to_string(&self) -> String { type IdTokenClaims (line 202) | pub struct IdTokenClaims function new (line 252) | pub fn new( function subject (line 294) | pub fn subject(&self) -> &SubjectIdentifier { function set_subject (line 298) | pub fn set_subject(mut self, subject: SubjectIdentifier) -> Self { function additional_claims (line 331) | pub fn additional_claims(&self) -> &AC { function additional_claims_mut (line 335) | pub fn additional_claims_mut(&mut self) -> &mut AC { method audiences (line 344) | fn audiences(&self) -> Option<&Vec> { method audiences (line 353) | fn audiences(&self) -> Option<&Vec> { method issuer (line 362) | fn issuer(&self) -> Option<&IssuerUrl> { method issuer (line 371) | fn issuer(&self) -> Option<&IssuerUrl> { type IdTokenFields (line 382) | pub struct IdTokenFields function new (line 404) | pub fn new(id_token: Option>, extra_fields: EF) ... function id_token (line 412) | pub fn id_token(&self) -> Option<&IdToken> { function extra_fields (line 416) | pub fn extra_fields(&self) -> &EF { FILE: src/id_token/tests.rs function test_id_token (line 26) | fn test_id_token() { function test_oauth2_response (line 74) | fn test_oauth2_response() { function test_minimal_claims_serde (line 123) | fn test_minimal_claims_serde() { function test_complete_claims_serde (line 202) | fn test_complete_claims_serde() { function test_accept_rfc3339_timestamp (line 471) | fn test_accept_rfc3339_timestamp() { function test_unknown_claims_serde (line 494) | fn test_unknown_claims_serde() { function test_audience (line 524) | fn test_audience() { type TestClaims (line 607) | struct TestClaims { function test_additional_claims (line 613) | fn test_additional_claims() { type AllOtherClaims (line 651) | struct AllOtherClaims(HashMap); function test_catch_all_additional_claims (line 655) | fn test_catch_all_additional_claims() { function test_audiences_claim (line 674) | fn test_audiences_claim() { function test_issuer_claim (line 697) | fn test_issuer_claim() { FILE: src/jwt/mod.rs type InvalidJsonWebTokenTypeError (line 27) | pub struct InvalidJsonWebTokenTypeError { type NormalizedJsonWebTokenType (line 68) | pub struct NormalizedJsonWebTokenType(String); type Target (line 71) | type Target = String; method deref (line 72) | fn deref(&self) -> &String { type Error (line 89) | type Error = InvalidJsonWebTokenTypeError; method try_from (line 95) | fn try_from(t: &JsonWebTokenType) -> Result String { method from (line 83) | fn from(t: NormalizedJsonWebTokenType) -> JsonWebTokenType { type JsonWebTokenAlgorithm (line 128) | pub enum JsonWebTokenAlgorithm function deserialize (line 151) | fn deserialize(deserializer: D) -> Result method serialize (line 181) | fn serialize(&self, serializer: SE) -> Result type JsonWebTokenHeader (line 195) | pub struct JsonWebTokenHeader type JsonWebTokenPayloadSerde (line 217) | pub trait JsonWebTokenPayloadSerde

: Debug method deserialize (line 221) | fn deserialize(payload: &[u8]) -> Result; method serialize (line 222) | fn serialize(payload: &P) -> Result; type JsonWebTokenJsonPayloadSerde (line 226) | pub struct JsonWebTokenJsonPayloadSerde; method deserialize (line 231) | fn deserialize(payload: &[u8]) -> Result { method serialize (line 236) | fn serialize(payload: &P) -> Result { type JsonWebTokenAccess (line 243) | pub trait JsonWebTokenAccess method unverified_header (line 251) | fn unverified_header(&self) -> &JsonWebTokenHeader; method unverified_payload (line 252) | fn unverified_payload(self) -> Self::ReturnType; method unverified_payload_ref (line 253) | fn unverified_payload_ref(&self) -> &P; method payload (line 255) | fn payload( method signing_alg (line 263) | fn signing_alg(&self) -> Result<&JS, SignatureVerificationError> { type JsonWebTokenError (line 292) | pub enum JsonWebTokenError { type JsonWebToken (line 302) | pub struct JsonWebToken function new (line 322) | pub fn new(payload: P, signing_key: &SK, alg: &JS) -> Result &JsonWebTokenHeader { function unverified_payload (line 370) | fn unverified_payload(self) -> Self::ReturnType { function unverified_payload_ref (line 373) | fn unverified_payload_ref(&self) -> &P { function payload (line 376) | fn payload( type ReturnType (line 400) | type ReturnType = &'a P; function unverified_header (line 401) | fn unverified_header(&self) -> &JsonWebTokenHeader { function unverified_payload (line 404) | fn unverified_payload(self) -> Self::ReturnType { function unverified_payload_ref (line 407) | fn unverified_payload_ref(&self) -> &P { function payload (line 410) | fn payload( function deserialize (line 433) | fn deserialize(deserializer: D) -> Result method serialize (line 522) | fn serialize(&self, serializer: SE) -> Result FILE: src/jwt/tests.rs type CoreAlgorithm (line 15) | type CoreAlgorithm = constant TEST_JWT (line 18) | pub const TEST_JWT: &str = constant TEST_JWT_PAYLOAD (line 28) | const TEST_JWT_PAYLOAD: &str = "It\u{2019}s a dangerous business, Frodo,... constant TEST_RSA_PUB_KEY (line 33) | pub const TEST_RSA_PUB_KEY: &str = "{ constant TEST_ED_PUB_KEY_ED25519 (line 47) | pub const TEST_ED_PUB_KEY_ED25519: &str = r#"{ constant TEST_EC_PUB_KEY_P256 (line 55) | pub const TEST_EC_PUB_KEY_P256: &str = r#"{ constant TEST_EC_PUB_KEY_P384 (line 63) | pub const TEST_EC_PUB_KEY_P384: &str = r#"{ constant TEST_RSA_PRIV_KEY (line 74) | pub const TEST_RSA_PRIV_KEY: &str = "-----BEGIN RSA PRIVATE KEY-----\n\ function test_jwt_algorithm_deserialization (line 103) | fn test_jwt_algorithm_deserialization() { function test_jwt_algorithm_serialization (line 130) | fn test_jwt_algorithm_serialization() { type JsonWebTokenStringPayloadSerde (line 167) | pub struct JsonWebTokenStringPayloadSerde; method deserialize (line 169) | fn deserialize(payload: &[u8]) -> Result Result { function test_jwt_basic (line 178) | fn test_jwt_basic() { function test_new_jwt (line 234) | fn test_new_jwt() { function test_invalid_signature (line 260) | fn test_invalid_signature() { function test_invalid_deserialization (line 288) | fn test_invalid_deserialization() { function test_json_web_token_type_normalization (line 369) | fn test_json_web_token_type_normalization() { FILE: src/logout.rs type LogoutProviderMetadata (line 22) | pub struct LogoutProviderMetadata type ProviderMetadataWithLogout (line 40) | pub type ProviderMetadataWithLogout = ProviderMetadata< type LogoutRequest (line 56) | pub struct LogoutRequest { method from (line 72) | fn from(value: EndSessionUrl) -> Self { method set_id_token_hint (line 83) | pub fn set_id_token_hint( method set_logout_hint (line 100) | pub fn set_logout_hint(mut self, logout_hint: LogoutHint) -> Self { method set_client_id (line 109) | pub fn set_client_id(mut self, client_id: ClientId) -> Self { method set_post_logout_redirect_uri (line 116) | pub fn set_post_logout_redirect_uri(mut self, redirect_uri: PostLogout... method set_state (line 123) | pub fn set_state(mut self, state: CsrfToken) -> Self { method add_ui_locale (line 132) | pub fn add_ui_locale(mut self, ui_locale: LanguageTag) -> Self { method http_get_url (line 139) | pub fn http_get_url(self) -> Url { type LogoutRequestParameters (line 62) | struct LogoutRequestParameters { function test_end_session_endpoint_deserialization (line 188) | fn test_end_session_endpoint_deserialization() { function test_logout_request_with_no_parameters (line 245) | fn test_logout_request_with_no_parameters() { function test_logout_request_with_all_parameters (line 262) | fn test_logout_request_with_all_parameters() { FILE: src/registration/mod.rs type AdditionalClientMetadata (line 36) | pub trait AdditionalClientMetadata: Debug + DeserializeOwned + Serialize {} type EmptyAdditionalClientMetadata (line 42) | pub struct EmptyAdditionalClientMetadata {} type ClientMetadata (line 47) | pub struct ClientMetadata function new (line 84) | pub fn new(redirect_uris: Vec, additional_metadata: A) -> S... function additional_metadata (line 157) | pub fn additional_metadata(&self) -> &A { function additional_metadata_mut (line 161) | pub fn additional_metadata_mut(&mut self) -> &mut A { type StandardClientMetadata (line 167) | struct StandardClientMetadata function deserialize (line 227) | fn deserialize(deserializer: D) -> Result method serialize (line 447) | fn serialize(&self, serializer: SE) -> Result type ClientRegistrationRequest (line 490) | pub struct ClientRegistrationRequest, additional_metadata: AC) -> ... function register (line 538) | pub fn register( function register_async (line 560) | pub fn register_async<'c, C>( function prepare_registration (line 584) | fn prepare_registration( function register_response (line 611) | fn register_response( function client_metadata (line 666) | pub fn client_metadata(&self) -> &ClientMetadata Option<&AccessToken> { function set_initial_access_token (line 675) | pub fn set_initial_access_token(mut self, access_token: Option &AC { function additional_metadata_mut (line 720) | pub fn additional_metadata_mut(&mut self) -> &mut AC { type AdditionalClientRegistrationResponse (line 726) | pub trait AdditionalClientRegistrationResponse: Debug + DeserializeOwned... type EmptyAdditionalClientRegistrationResponse (line 732) | pub struct EmptyAdditionalClientRegistrationResponse {} type ClientRegistrationResponse (line 739) | pub struct ClientRegistrationResponse function new (line 785) | pub fn new( function from_client_metadata (line 804) | pub fn from_client_metadata( function additional_metadata (line 869) | pub fn additional_metadata(&self) -> &AC { function additional_metadata_mut (line 873) | pub fn additional_metadata_mut(&mut self) -> &mut AC { function additional_response (line 878) | pub fn additional_response(&self) -> &AR { function additional_response_mut (line 882) | pub fn additional_response_mut(&mut self) -> &mut AR { type RegisterErrorResponseType (line 890) | pub trait RegisterErrorResponseType: ErrorResponseType + 'static {} type ClientRegistrationError (line 895) | pub enum ClientRegistrationError FILE: src/registration/tests.rs function test_metadata_serialization (line 20) | fn test_metadata_serialization() { function test_metadata_serialization_minimal (line 267) | fn test_metadata_serialization_minimal() { function test_response_serialization (line 315) | fn test_response_serialization() { FILE: src/token.rs type TokenResponse (line 8) | pub trait TokenResponse: OAuth2TokenResponse method id_token (line 19) | fn id_token(&self) -> Option<&IdToken>; function id_token (line 32) | fn id_token(&self) -> Option<&IdToken> { FILE: src/types/jwk.rs type JsonWebKey (line 16) | pub trait JsonWebKey: Clone + Debug + DeserializeOwned + Serialize + 'st... method key_id (line 24) | fn key_id(&self) -> Option<&JsonWebKeyId>; method key_type (line 27) | fn key_type(&self) -> &... method key_use (line 31) | fn key_use(&self) -> Option<&Self::KeyUse>; method signing_alg (line 37) | fn signing_alg(&self) -> JsonWebKeyAlgorithm<&Self::SigningAlgorithm>; method new_symmetric (line 40) | fn new_symmetric(key: Vec) -> Self; method verify_signature (line 46) | fn verify_signature( method hash_bytes (line 64) | fn hash_bytes(&self, bytes: &[u8], alg: &Self::SigningAlgorithm) -> Re... type JsonWebKeyAlgorithm (line 69) | pub enum JsonWebKeyAlgorithm { type PrivateSigningKey (line 79) | pub trait PrivateSigningKey { method sign (line 84) | fn sign( method as_verification_key (line 91) | fn as_verification_key(&self) -> Self::VerificationKey; type JsonWebKeyType (line 95) | pub trait JsonWebKeyType: type JsonWebKeyUse (line 101) | pub trait JsonWebKeyUse: Debug + DeserializeOwned + Serialize + 'static { method allows_signature (line 103) | fn allows_signature(&self) -> bool; method allows_encryption (line 106) | fn allows_encryption(&self) -> bool; type JweContentEncryptionAlgorithm (line 110) | pub trait JweContentEncryptionAlgorithm: method key_type (line 117) | fn key_type(&self) -> Result; type JweKeyManagementAlgorithm (line 121) | pub trait JweKeyManagementAlgorithm: Debug + DeserializeOwned + Serializ... type JwsSigningAlgorithm (line 126) | pub trait JwsSigningAlgorithm: method key_type (line 134) | fn key_type(&self) -> Option; method uses_shared_secret (line 137) | fn uses_shared_secret(&self) -> bool; method rsa_sha_256 (line 143) | fn rsa_sha_256() -> Self; FILE: src/types/jwks.rs type JsonWebKeySet (line 22) | pub struct JsonWebKeySet function check_key_compatibility (line 36) | pub(crate) fn check_key_compatibility( function new (line 69) | pub fn new(keys: Vec) -> Self { function filter_keys (line 74) | pub(crate) fn filter_keys( function fetch (line 96) | pub fn fetch( function fetch_async (line 113) | pub fn fetch_async<'c, C>( function fetch_request (line 132) | fn fetch_request(url: &JsonWebKeySetUrl) -> Result(http_response: HttpResponse) -> Result &Vec { method clone (line 179) | fn clone(&self) -> Self { method default (line 187) | fn default() -> Self { FILE: src/types/localized.rs method as_ref (line 13) | fn as_ref(&self) -> &str { method fmt (line 18) | fn fmt(&self, f: &mut std::fmt::Formatter) -> Result<(), std::fmt::Error> { function split_language_tag_key (line 23) | pub(crate) fn split_language_tag_key(key: &str) -> (&str, Option( type LocalizedClaim (line 54) | pub struct LocalizedClaim(HashMap, Option); function new (line 57) | pub fn new() -> Self { function contains_key (line 62) | pub fn contains_key(&self, locale: Option<&LanguageTag>) -> bool { function get (line 71) | pub fn get(&self, locale: Option<&LanguageTag>) -> Option<&T> { function iter (line 80) | pub fn iter(&self) -> impl Iterator, &T)> { function insert (line 91) | pub fn insert(&mut self, locale: Option, value: T) -> Optio... function remove (line 103) | pub fn remove(&mut self, locale: Option<&LanguageTag>) -> Option { function flatten_or_none (line 112) | pub(crate) fn flatten_or_none(self) -> Option> { method default (line 129) | fn default() -> Self { function from (line 134) | fn from(default: T) -> Self { function from_iter (line 139) | fn from_iter, T)>>(iter: I) ... type Item (line 154) | type Item = as Iterator>::Item; type IntoIter (line 155) | type IntoIter = LocalizedClaimIterator; method into_iter (line 157) | fn into_iter(self) -> Self::IntoIter { type LocalizedClaimIterator (line 171) | pub struct LocalizedClaimIterator { type Item (line 175) | type Item = (Option, T); method next (line 176) | fn next(&mut self) -> Option { FILE: src/types/mod.rs type ApplicationType (line 25) | pub trait ApplicationType: Debug + DeserializeOwned + Serialize + 'stati... type AuthDisplay (line 29) | pub trait AuthDisplay: AsRef + Debug + DeserializeOwned + Serialize... type AuthPrompt (line 32) | pub trait AuthPrompt: AsRef + 'static {} type ClaimName (line 35) | pub trait ClaimName: Debug + DeserializeOwned + Serialize + 'static {} type ClaimType (line 38) | pub trait ClaimType: Debug + DeserializeOwned + Serialize + 'static {} type ClientAuthMethod (line 41) | pub trait ClientAuthMethod: Debug + DeserializeOwned + Serialize + 'stat... type GrantType (line 44) | pub trait GrantType: Debug + DeserializeOwned + Serialize + 'static {} type SigningError (line 49) | pub enum SigningError { type ResponseMode (line 63) | pub trait ResponseMode: Debug + DeserializeOwned + Serialize + 'static {} type ResponseType (line 67) | pub trait ResponseType: AsRef + Debug + DeserializeOwned + Serializ... method to_oauth2 (line 70) | fn to_oauth2(&self) -> oauth2::ResponseType; type SubjectIdentifierType (line 74) | pub trait SubjectIdentifierType: Debug + DeserializeOwned + Serialize + ... method as_ref (line 83) | fn as_ref(&self) -> &str { type ResponseTypes (line 404) | pub struct ResponseTypes( function new (line 413) | pub fn new(s: Vec) -> Self { type Target (line 418) | type Target = Vec; method deref (line 419) | fn deref(&self) -> &Vec { FILE: src/types/tests.rs function test_issuer_url_append (line 4) | fn test_issuer_url_append() { function test_url_serialize (line 40) | fn test_url_serialize() { function test_string_bool_parse (line 61) | fn test_string_bool_parse() { FILE: src/user_info.rs function user_info_impl (line 87) | pub(crate) fn user_info_impl<'a>( type UserInfoRequest (line 109) | pub struct UserInfoRequest<'a, JE, K> function request (line 131) | pub fn request( function request_async (line 152) | pub fn request_async<'c, AC, C, GC>( function prepare_request (line 176) | fn prepare_request(&self) -> Result { function user_info_response (line 191) | fn user_info_response( function require_signed_response (line 248) | pub fn require_signed_response(mut self, require_signed_response: bool) ... function require_issuer_match (line 257) | pub fn require_issuer_match(mut self, iss_required: bool) -> Self { function require_audience_match (line 268) | pub fn require_audience_match(mut self, aud_required: bool) -> Self { function set_response_type (line 276) | pub fn set_response_type(mut self, response_type: UserInfoResponseType) ... type UserInfoClaims (line 284) | pub struct UserInfoClaims(UserInf... function new (line 291) | pub fn new(standard_claims: StandardClaims, additional_claims: AC) -... function from_json (line 304) | pub fn from_json( function subject (line 343) | pub fn subject(&self) -> &SubjectIdentifier { function set_subject (line 347) | pub fn set_subject(&mut self, subject: SubjectIdentifier) { function standard_claims (line 379) | pub fn standard_claims(&self) -> &StandardClaims { function additional_claims (line 384) | pub fn additional_claims(&self) -> &AC { function additional_claims_mut (line 388) | pub fn additional_claims_mut(&mut self) -> &mut AC { type UserInfoClaimsImpl (line 395) | pub(crate) struct UserInfoClaimsImpl method audiences (line 421) | fn audiences(&self) -> Option<&Vec> { method audiences (line 430) | fn audiences(&self) -> Option<&Vec> { method issuer (line 440) | fn issuer(&self) -> Option<&IssuerUrl> { method issuer (line 449) | fn issuer(&self) -> Option<&IssuerUrl> { type UserInfoJsonWebToken (line 456) | pub struct UserInfoJsonWebToken< function new (line 474) | pub fn new( function claims (line 487) | pub fn claims( type UserInfoResponseType (line 508) | pub enum UserInfoResponseType { type UserInfoError (line 518) | pub enum UserInfoError type TestClaims (line 550) | struct TestClaims { function test_additional_claims (line 556) | fn test_additional_claims() { type AllOtherClaims (line 593) | struct AllOtherClaims(HashMap); function test_catch_all_additional_claims (line 597) | fn test_catch_all_additional_claims() { FILE: src/verification/mod.rs type AudiencesClaim (line 25) | pub(crate) trait AudiencesClaim { method audiences (line 26) | fn audiences(&self) -> Option<&Vec>; type IssuerClaim (line 29) | pub(crate) trait IssuerClaim { method issuer (line 30) | fn issuer(&self) -> Option<&IssuerUrl>; type ClaimsVerificationError (line 36) | pub enum ClaimsVerificationError { type SignatureVerificationError (line 72) | pub enum SignatureVerificationError { type JwtClaimsVerifier (line 117) | pub(crate) struct JwtClaimsVerifier<'a, K> function new (line 136) | pub fn new(client_id: ClientId, issuer: IssuerUrl, signature_keys: JsonW... function require_audience_match (line 167) | pub fn require_audience_match(mut self, aud_required: bool) -> Self { function require_issuer_match (line 172) | pub fn require_issuer_match(mut self, iss_required: bool) -> Self { function require_signature_check (line 177) | pub fn require_signature_check(mut self, sig_required: bool) -> Self { function set_allowed_algs (line 182) | pub fn set_allowed_algs(mut self, algs: I) -> Self function allow_any_alg (line 189) | pub fn allow_any_alg(mut self) -> Self { function set_allowed_jose_types (line 197) | pub fn set_allowed_jose_types(mut self, types: I) -> Self function allow_all_jose_types (line 204) | pub fn allow_all_jose_types(mut self) -> Self { function set_client_secret (line 209) | pub fn set_client_secret(mut self, client_secret: ClientSecret) -> Self { function set_other_audience_verifier_fn (line 214) | pub fn set_other_audience_verifier_fn(mut self, other_aud_verifier_fn... function validate_jose_header (line 222) | fn validate_jose_header( function verified_claims (line 283) | pub fn verified_claims(&self, jwt: A) -> Result( type NonceVerifier (line 495) | pub trait NonceVerifier { method verify (line 499) | fn verify(self, nonce: Option<&Nonce>) -> Result<(), String>; method verify (line 503) | fn verify(self, nonce: Option<&Nonce>) -> Result<(), String> { method verify (line 520) | fn verify(self, nonce: Option<&Nonce>) -> Result<(), String> { type IdTokenVerifier (line 527) | pub struct IdTokenVerifier<'a, K> function new (line 544) | fn new(jwt_verifier: JwtClaimsVerifier<'a, K>) -> Self { function new_public_client (line 558) | pub fn new_public_client( function new_insecure_without_verification (line 568) | pub fn new_insecure_without_verification() -> Self { function new_confidential_client (line 586) | pub fn new_confidential_client( function set_allowed_algs (line 599) | pub fn set_allowed_algs(mut self, algs: I) -> Self function allow_any_alg (line 608) | pub fn allow_any_alg(mut self) -> Self { function set_allowed_jose_types (line 616) | pub fn set_allowed_jose_types(mut self, types: I) -> Self function allow_all_jose_types (line 625) | pub fn allow_all_jose_types(mut self) -> Self { function set_auth_context_verifier_fn (line 634) | pub fn set_auth_context_verifier_fn(mut self, acr_verifier_fn: T) -> ... function set_auth_time_verifier_fn (line 646) | pub fn set_auth_time_verifier_fn(mut self, auth_time_verifier_fn: T) ... function enable_signature_check (line 658) | pub fn enable_signature_check(mut self) -> Self { function insecure_disable_signature_check (line 670) | pub fn insecure_disable_signature_check(mut self) -> Self { function require_issuer_match (line 676) | pub fn require_issuer_match(mut self, iss_required: bool) -> Self { function require_audience_match (line 682) | pub fn require_audience_match(mut self, aud_required: bool) -> Self { function set_time_fn (line 690) | pub fn set_time_fn(mut self, time_fn: T) -> Self function set_issue_time_verifier_fn (line 702) | pub fn set_issue_time_verifier_fn(mut self, iat_verifier_fn: T) -> Self function set_other_audience_verifier_fn (line 718) | pub fn set_other_audience_verifier_fn(mut self, other_aud_verifier_fn... function verified_claims (line 728) | pub(crate) fn verified_claims<'b, AC, GC, JE, N>( function verified_claims_owned (line 756) | pub(crate) fn verified_claims_owned( function verify_claims (line 784) | fn verify_claims( type UserInfoVerifier (line 869) | pub struct UserInfoVerifier<'a, JE, K> function new (line 888) | pub fn new( function expected_subject (line 901) | pub(crate) fn expected_subject(&self) -> Option<&SubjectIdentifier> { function require_issuer_match (line 906) | pub fn require_issuer_match(mut self, iss_required: bool) -> Self { function require_audience_match (line 912) | pub fn require_audience_match(mut self, aud_required: bool) -> Self { function verified_claims (line 917) | pub(crate) fn verified_claims( FILE: src/verification/tests.rs type CoreJsonWebTokenHeader (line 24) | type CoreJsonWebTokenHeader = type CoreJwtClaimsVerifier (line 27) | type CoreJwtClaimsVerifier<'a> = JwtClaimsVerifier<'a, CoreJsonWebKey>; function assert_unsupported (line 29) | fn assert_unsupported(result: Result, exp... function test_jose_header (line 40) | fn test_jose_header() { type TestClaims (line 290) | struct TestClaims { method audiences (line 296) | fn audiences(&self) -> Option<&Vec> { method issuer (line 301) | fn issuer(&self) -> Option<&IssuerUrl> { type TestClaimsJsonWebToken (line 305) | type TestClaimsJsonWebToken = JsonWebToken< function test_jwt_verified_claims (line 313) | fn test_jwt_verified_claims() { type CoreIdTokenJwt (line 793) | type CoreIdTokenJwt = JsonWebToken< function test_id_token_verified_claims (line 801) | fn test_id_token_verified_claims() { function test_new_id_token (line 1113) | fn test_new_id_token() { function test_user_info_verified_claims (line 1186) | fn test_user_info_verified_claims() { function test_new_user_info_claims (line 1315) | fn test_new_user_info_claims() { FILE: tests/rp_certification_code.rs type TestState (line 29) | struct TestState { method init (line 46) | pub fn init(test_id: &'static str, reg_request_fn: F) -> Self method access_token (line 75) | pub fn access_token(&self) -> &AccessToken { method authorize (line 79) | pub fn authorize(mut self, scopes: &[Scope]) -> Self { method exchange_code (line 151) | pub fn exchange_code(mut self) -> Self { method id_token (line 179) | pub fn id_token(&self) -> &CoreIdToken { method id_token_verifier (line 183) | pub fn id_token_verifier(&self, jwks: CoreJsonWebKeySet) -> CoreIdToke... method id_token_claims (line 195) | pub fn id_token_claims(&self) -> &CoreIdTokenClaims { method id_token_claims_failure (line 202) | pub fn id_token_claims_failure(&self) -> ClaimsVerificationError { method jwks (line 209) | pub fn jwks(&self) -> CoreJsonWebKeySet { method set_auth_type (line 214) | pub fn set_auth_type(mut self, auth_type: AuthType) -> Self { method user_info_claims (line 219) | pub fn user_info_claims(&self) -> CoreUserInfoClaims { method user_info_claims_failure (line 231) | pub fn user_info_claims_failure(&self) -> UserInfoError &'static str { function set_test_id (line 32) | pub fn set_test_id(test_id: &'static str) { function _init_log (line 65) | fn _init_log() { function init_log (line 70) | pub fn init_log(test_id: &'static str) { function clone_request (line 77) | pub(crate) fn clone_request(request: &HttpRequest) -> HttpRequest { function http_client (line 89) | pub fn http_client(request: HttpRequest) -> Result method panic_if_fail (line 120) | fn panic_if_fail(self, msg: &'static str) -> T; function panic_if_fail (line 126) | fn panic_if_fail(self, msg: &'static str) -> T { function issuer_url (line 144) | pub fn issuer_url(test_id: &str) -> IssuerUrl { function get_provider_metadata (line 152) | pub fn get_provider_metadata(test_id: &str) -> CoreProviderMetadata { function register_client (line 160) | pub fn register_client(