{(      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~                 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFG H IJKL MNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~           !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Y BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0BDRSize in bytes type aliasEfor code documentation purpose only, just a simple type alias on Int#)Offset in a bytearray, string, type aliasEfor code documentation purpose only, just a simple type alias on Int#File size in bytes BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableSafe)0DRSafe )*0DRNone )0<=BDR BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0BDR:Flag record whether a specific byte array is pinned or notturn an Int# into a Bool<Since GHC 7.8, boolean primitive don't return Bool but Int#.A version friendly of andI#!A version friendly of quotRemInt#*A version friendly fo copyAddrToByteArray#only available from GHC 7.8*A mkWeak# version that keep working on 8.0,signature change in ghc-prim: * 0.4: mkWeakD :: o -> b -> c -> State RealWorld -> (State RealWorld, Weak b) * 0.5 :mkWeak :: o -> b -> (State RealWorld -> (State RealWorld, c )) -> State RealWorld -> (State RealWorld, Weak b) 4   BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableSafe)0DR BSD-style FoundationstableportableSafe)0DR!None )0DIRF" BSD-style FoundationNone )09;DRNegation support e.g. -(f x)Fractional Literal support'e.g. 1.2 :: Double 0.03 :: FloatIntegral Literal support&e.g. 123 :: Integer 123 :: Word8*' BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableSafe)0DRNLKMNMLK# BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableSafe)0DRced$ BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DRE% BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DR/Only to use internally for internal error cases!for support of if .. then .. elseEjiklnm  !"#$%&;>'()*+,-./0<=1ABC3456789:?@RQSYbgv|}~& BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DIRBAn error related to the evaluation of a Partial value that failed.?it contains the name of the function and the reason for failurePartialiality wrapper."Throw an asynchronous PartialErrorCCreate a value that is partial. this can only be unwrap using the  functionDewrap a possible partial value*Partial function to get the head of a list1Partial function to grab the value inside a Maybe   'None)0DR>Number literals, convertible through the generic Integer type.Fall number are Enum'erable, meaning that you can move to next element(None)06DReRepresent class of things that can be added together, contains a neutral element and is commutative. )x + azero = x azero + x = x x + y = y + x          6)None)0DR1Represent class of things that can be subtracted.dNote that the result is not necessary of the same type as the operand depending on the actual type. For example: (-) :: Int -> Int -> Int (-) :: DateTime -> DateTime -> Seconds (-) :: Ptr a -> Ptr a -> PtrDiff (-) :: Natural -> Natural -> Maybe Natural6*None )069;DR3Represent types that supports an euclidian division "(x div  y) * y + (x mod  y) == x9Represent class of things that can be multiplied together #x * midentity = x midentity * x = x$Identity element over multiplication;Multiplication of 2 elements that result in another elementRaise to power, repeated multiplication e.g. > a ^ 2 = a * a > a ^ 10 = (a ^ 5) * (a ^ 5) .. (^) :: (IsNatural n) => a -> n -> a+ !"#$%&'()*+,-./0123456789:;<=>? $ !"#$%&'()*+,-./0123456789:;<=>?778+ BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DIRSize of a data structure.@More specifically, it represents the number of elements of type ty# that fit into the data structure.7lengthSize (fromList ['a', 'b', 'c', '']) :: Size CharSize 4Same caveats as  apply here.@"Size of a data structure in bytes.:Offset in a data structure consisting of elements of type ty.Int is a terrible backing type which is hard to get away from, considering that GHC/Haskell are mostly using this for offset. Trying to bring some sanity by a lightweight wrapping.AIOffset in bytes used for memory addressing (e.g. in a vector, string, ..)BFile size in bytes@ABCDEFGHIJKLMNOPQRS@ABCDEFGHI@ABCDEFGHIJKLMNOPQRS,None)09DRIEEE754 Floating PointTUTU BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )069;DRRound up, to the next integral.Also known as ceiling$Round down, to the previous integralAlso known as floorGTruncate to the closest integral to the fractional number closer to 0.TThis is equivalent to roundUp for negative Number and roundDown for positive NumberRound to the nearest integral roundNearest 3.64 > roundNearest 3.4 3-types that have sign and can be made absoluteSign of a signed numberV(( V- BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DR?Exception during an operation accessing the vector out of boundXRepresent the type of operation, the index accessed, and the total length of the vector.W<The type of operation that triggers an OutOfBound exception.&OOB_Index: reading an immutable vector"OOB_Read: reading a mutable vector!OOB_Write: write a mutable vectorXYZ[\]^W_`abcd XYZ[\]^W_`abXYZ[\]^W_`abcd None)0DRUnsafe Shift Left OperatorUnsafe Shift Right Operator&Round up (if needed) to a multiple of  alignment closst to m alignment needs to be a power of two.alignRoundUp 16 8 = 16 alignRoundUp 15 8 = 16(Round down (if needed) to a multiple of  alignment closest to m alignment needs to be a power of two /alignRoundDown 15 8 = 8 alignRoundDown 8 8 = 8Number to AlignAlignment (power of 2)Number to AlignAlignment (power of 2)  BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )09;<=DR1Class of things that can be converted from a to b. BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0ABDRT)Primitive monad that can handle mutation.For example: IO and ST.3type of state token associated with the PrimMonad m0type of variable associated with the PrimMonad mmUnwrap the State# token to pass to a function a primitive function that returns an unboxed state and a value.&Throw Exception in the primitive monad(Run a Prim monad from a dedicated state#&Build a new variable in the Prim Monad#Read the variable in the Prim Monad$Write the variable in the Prim Monade just like unwrapPrimMonad9 but throw away the result and return just the new State#f+Convert a prim monad to another prim monad.The net effect is that it coerce the state repr to another, so the runtime representation should be the same, otherwise hilary ensues.g%Convert any prim monad to an ST monadh%Convert any prim monad to an IO monadi$Convert any IO monad to a prim monadj(Touch primitive lifted to any prim monadefghijklefghij efghijkl/ BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0BDR NRepresent the accessor for types that can be stored in the UArray and MUArray.=Types need to be a instance of storable and have fixed sized.%get the size in bytes of a ty element-return the element stored at a specific index.Read an element at an index in a mutable array7Write an element to a specific cell in a mutable array.Read from Address, without a state. the value read should be considered a constant for all pratical purpose, otherwise bad thing will happens.4Read a value from Addr in a specific primitive monad3Write a value to Addr in a specific primitive monadmICast a Size linked to type A (Size A) to a Size linked to type B (Size B) nopqrsmtuvwxyz{|}~nopqrsmtuvwnopqrsmtuvwxyz{|}~ BSD-styleHaskell Foundation experimentalportableNone)0DRUExtending the Storable type class to the types that can be sequenced in a structure.&Storable type of self determined size.like  but at a given offset.like  but at a given offset.       9T 9T       BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )069;DR0 BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0BDR-Create a pointer with an associated finalizer3Check if 2 final ptr points on the same memory bitsit stand to reason that provided a final ptr that is still being referenced and thus have the memory still valid, if 2 final ptrs have the same address, they should be the same final ptr$create a new FinalPtr from a Pointer'Create a new FinalPtr from a ForeignPtr.Cast a finalized pointer from type a to type b}Looks at the raw pointer inside a FinalPtr, making sure the data pointed by the pointer is not finalized during the call to fUnsafe version of    BSD-style foundation experimentalportableNone)0:DR Path type classddefines the Path associated types and basic functions to implement related to the path manipulation # TODO, add missing enhancement: ~splitExtension :: PathEnt path -> (PathEnt path, PathEnt path) addExtension :: PathEnt path -> PathEnt path -> PathEnt path ( .$) :: path -> PathEnt path -> path (- .") :: path -> PathEnt path -> path 'the associated PathEntity of the given path this type is the minimal element contained in the Path a Path is not a collection but it is possible to see this associated type equivalent to the 1 type family#the associated prefix of the given pathin the case of a 23-, it is a void (i.e. `()`) in the case of a 24!, it is the schema, host, port...'the associated suffix of the given pathin the case of the 23/, it is a void (i.e. `()`) in the case of the 24!, it is a the query, the fragment"join a path entity to a given path +split the path into the associated elements!+build the path from the associated elements"*parent is only going to drop the filename.Gif you actually want to reference to the parent directory, simply uses:  parent "." = "." <> ".." parent ("foo.hs" :: FilePath).%parent ("foo/bar/baz.hs" :: FilePath)foo/bar#"get the filename of the given path.If there is no filename, you will receive the  of the filename ("foo.hs" :: FilePath)foo.hs'filename ("foo/bar/baz.hs" :: FilePath)baz.hs$get the path prefix information prefix ("/home/tab" :: FilePath)Absoluteprefix ("home/tab" :: FilePath)Relative#or for URI (TODO, not yet accurate) prefix " .http://github.com/vincenthz/hs-foundation?w=1"; == URISchema http Nothing Nothing "github.com" Nothing %get the path suffix information suffix ("/home/tab" :: FilePath)()#or for URI (TODO, not yet accurate) suffix " .http://github.com/vincenthz/hs-foundation?w=1"' == URISuffix (["w", "1"], Nothing)  !"#$%  !"#$%  !"#$% !"#$% BSD-style foundation experimentalportableNone)0DR0 TODO this is not implemented yet &'()*+,-./012 &'()*+,-./01 01./,-*+()&'&'()*+,-./012None)09DR3456789:;<=>?@AB3456789:;<=>?@3456789:;<=>?@3 456789:;<=>?@AB5 BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )069;DRC1Collection of things that can be looked up by KeyCDEFCDEFCDEF6 BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DR7 BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalGoodNone )0DRTqtry to fill the ptr with the amount of data required. Return the number of bytes, or a negative number otherwise  8 BSD-stylePsychohistorians experimentalportableNone)0DRSimple Reader monadSimple State monad 9 BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0BDR(Check if the byte is a continuation byteJGet the number of following bytes given the first byte of a UTF8 sequence.(Check if the byte is a continuation byteJGet the number of following bytes given the first byte of a UTF8 sequence. : BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DR?Simple helper to split a list repeatly when the predicate match; BSD-style foundation experimentalportableNone)0DR5Defines the maximum size in bytes of unpinned arrays.?You can change this value by setting the environment variable !HS_FOUNDATION_UARRAY_UNPINNED_MAX to an unsigned integer number. Note: We use  here. If the environment variable changes during runtime and the runtime system decides to recompute this value, referential transparency is violated (like the First Order violated the Galactic Concordance!).CTODO The default value of 1024 bytes is arbitrarily chosen for now.< BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0BDR G7A Mutable array of types built on top of GHC primitive./Element in this array can be modified in place.read a cell in a mutable array.2If the index is out of bounds, an error is raised.<read from a cell in a mutable array without bounds checking.NReading from invalid memory can return unpredictable and invalid values. use  if unsure.#Write to a cell in a mutable array.2If the index is out of bounds, an error is raised.;write to a cell in a mutable array without bounds checking.^Writing with invalid bounds will corrupt memory and your program will become unreliable. use  if unsure.-Create a new pinned mutable array of size @n.Ball the cells are uninitialized and could contains invalid values.?All mutable arrays are allocated on a 64 bits aligned addresses&Create a new mutable array of size @n.When memory for a new array is allocated, we decide if that memory region should be pinned (will not be copied around by GC) or unpinned (can be moved around by GC) depending on its size.MYou can change the threshold value used by setting the environment variable !HS_FOUNDATION_UARRAY_UNPINNED_MAX.ECopy a number of elements from an array to another array with offsets1return the numbers of elements in a mutable arrayGH"the start pointer with a finalizer/the number of elements (in elements, not bytes)destination arrayoffset at destination source arrayoffset at sourcenumber of elements to copyGHGH= BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0BDRCopy all bytes from a byteArray to a mutableByteArray$Copy @nbBytes bytes from a byteArray to a mutableByteArray starting at an offsetsame as  except copy using 32 bits wordsame as  except copy using 64 bits word> BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone $)0BDRI/An array of type built on top of GHC primitive.The elements need to have fixed sized and the representation is a packed contiguous array in memory that can easily be passed to foreign interface4Copy every cells of an existing array to a new array!Thaw an array to a mutable array.the array is not modified, instead a new mutable array is created and every values is copied, before returning the mutable array.5Return the element at a specific index from an array.5If the index @n is out of bounds, an error is raised.MReturn the element at a specific index from an array without bounds checking.NReading from invalid memory can return unpredictable and invalid values. use  if unsure.+return the number of elements of the array.Copy nu sequential elements from the specified offset in a source array to the specified position in a destination array.mThis function does not check bounds. Accessing invalid memory can return unpredictable and invalid values.aAllocate a new array with a fill function that has access to the elements of the source array.%Freeze a mutable array into an array./the MUArray must not be changed after freezing.Thaw an immutable array.*The UArray must not be used after thawing.Create a new array of size /n by settings each cells through the function f.*Create a pinned array that is filled by a filler- function (typically an IO call like hGetBuf)&make an array from a list of elements.transform an array to a list."Check if two vectors are identicalCompare 2 vectors7Append 2 arrays together by creating a new bigger array9update an array by creating a new array with the updates.Jthe operation copy the previous array, modify it in place, then freeze it.JIJKL"the start pointer with a finalizer/the number of elements (in elements, not bytes)Mdestination arrayoffset at destination source arrayoffset at sourcenumber of elements to copy Source arrayLength of the destination array4Function called for each element in the source arrayReturns the filled new arraythe size of the array,the function that set the value at the indexthe array createdthe size of the arrayfilling function thatN    EIJKLMNHIJKLMN     BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DRIJKMNIJKMN  BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DRA  !"#$%&'()*+,-./0123456789:;<=>?@AHL LH? BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DROElement type of a collectionOOO@ BSD-style foundation experimentalportableNone)0DIRP.The in-progress state of a building operation.The previous buffers are in reverse order, and this contains the current buffer and the state of progress packing the elements inside.Y-Collections that can be built chunk by chunk.Use the  instance of V to chain \ operations and feed it into ]:HrunST $ build 32 (append 'a' >> append 'b' >> append 'c') :: UArray Char"abc"Z>Mutable collection type used for incrementally writing chunks.[)Unit of the smallest step possible in an \ operation.qA UTF-8 character can have a size between 1 and 4 bytes, so this should be defined as 1 byte for collections of '.PQRSTUVWXYZ[\]BPQRSTUVWXYZ[]\PQRSTUVWXYZ[\]BA BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DR^/Give the ability to fold a collection on itself_%Left-associative fold of a structure.In the case of lists, foldl, when applied to a binary operator, a starting value (typically the left-identity of the operator), and a list, reduces the list using the binary operator, from left to right: Efoldl f z [x1, x2, ..., xn] == (...((z `f` x1) `f` x2) `f`...) `f` xnNote that to produce the outermost application of the operator the entire input list must be traversed. This means that foldl' will diverge if given an infinite list.hAlso note that if you want an efficient left-fold, you probably want to use foldl' instead of foldl. The reason for this is that latter does not force the "inner" results (e.g. z f x1 in the above example) before applying them to the operator (e.g. to (f x2)). This results in a thunk chain O(n) elements long, which then must be evaluated from the outside-in.`QLeft-associative fold of a structure but with strict application of the operator.a&Right-associative fold of a structure. @foldr f z [x1, x2, ..., xn] == x1 `f` (x2 `f` ... (xn `f` z)...)bSRight-associative fold of a structure, but with strict application of the operator.^_`abCD^a_`b^_`abCDB BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )069;DRc.Collection of elements that can indexed by intcdeEFcedcdeEFCNone)06DRfKA monomorphic functor that maps the inner values to values of the same typefgGHfgfggGHD BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DRhjCollection of things that can be made mutable, modified and then freezed into an MutableFreezed collectionhijklmnopqrstI hijkomnlprtqsh ijklmnopqrstIE BSD-style Foundation experimentalportableNone )0:ADRT u&A set of methods for ordered colectionvCheck if a collection is emptyw,Length of a collection (number of Element c)x1Check if a collection contains a specific elementThis is the inverse of y.y;Check if a collection does *not* contain a specific elementThis is the inverse of x.z'Get the maximum element of a collection{'Get the minimum element of a collection|$NonEmpty property for any Collection#This can only be made, through the ~ smart contructor~1Smart constructor to create a NonEmpty collectionsIf the collection is empty, then Nothing is returned Otherwise, the collection is wrapped in the NonEmpty propertysame as ~Z, but assume that the collection is non empty, and return an asynchronous error if it is.uvwxyz{|J}~KLMN uvwz{xy|}~uvwxyz{|J}~KLMNF BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )069:;<DR&A set of methods for ordered colection*Take the first @n elements of a collection)Take the last @n elements of a collection*Drop the first @n elements of a collection)Drop the last @n elements of a collection*Split the collection at the @n'th elements7Split the collection at the @n'th elements from the end:Split on a specific elements returning a list of colletion1Split a collection when the predicate return true1Split a collection when the predicate return trueThe v function takes an element and a list and `intersperses' that element between the elements of the list. For example, &intersperse ',' "abcde" == "a,b,c,d,e" xs xss is equivalent to ( ( xs xss)). It inserts the list xs in between the lists in xss and concatenates the result.2Split a collection while the predicate return true2Filter all the elements that satisfy the predicateGPartition the elements thtat satisfy the predicate and those that don'tReverse a collectionyDecompose a collection into its first element and the remaining collection. If the collection is empty, returns Nothing.Decompose a collection into a collection without its last element, and the last element If the collection is empty, returns Nothing.+Prepend an element to an ordered collection*Append an element to an ordered collection(Find an element in an ordered collection=Sort an ordered collection using the specified order function)Create a collection with a single element/get the first element of a non-empty collection.get the last element of a non-empty collectionGExtract the elements after the first element of a non-empty collection.GExtract the elements before the last element of a non-empty collection.ZTakes two collections and returns True iff the first collection is a prefix of the second.ZTakes two collections and returns True iff the first collection is a suffix of the second. OPQOPQG BSD-style foundation experimentalportableNone )09;<=DR takes two collections and returns a collections of corresponding pairs. If one input collection is short, excess elements of the longer collection are discarded.Like , but works with 3 collections.Like , but works with 4 collections.Like , but works with 5 collections.Like , but works with 6 collections.Like , but works with 7 collections.q transforms a collection of pairs into a collection of first components and a collection of second components.Like 0, but works on a collection of 3-element tuples.Like 0, but works on a collection of 4-element tuples.Like 0, but works on a collection of 5-element tuples.Like 0, but works on a collection of 6-element tuples.Like 0, but works on a collection of 7-element tuples. generalises j by zipping with the function given as the first argument, instead of a tupling function. For example,  (+)U is applied to two collections to produce the collection of corresponding sums.Like , but works with 3 collections.Like , but works with 4 collections.Like , but works with 5 collections.Like , but works with 6 collections.Like , but works with 7 collections.#RSTUVWXYZ[\]^_` RSTUVWXYZ[\]^_` BSD-style FoundationstablegoodNone)0DRGet some of the system entropyH BSD-style foundation experimentalportableNone )0:BDRaHassuming the given ByteArray is a valid modified UTF-8 sequence of bytesJWe only modify the given Unicode Null-character (0xC080) into a null bytesFIXME: need to evaluate the kind of modified UTF8 GHC is actually expecting it is plausible they only handle the Null Bytes, which this function actually does.bcaabca BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )069;DRfCDEFOPQRSTUVWXYZ[]\^a_`bcedfghijkomnlprtqsuvwz{xy|}~jOfgg^_`abuvwxyz{|}}~hijklmnopqrstcdeCDEFYZ[\]VWXPQRSTUI BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0BDRMutable Array of a Array of ad1return the numbers of elements in a mutable arraye5Return the element at a specific index from an array.5If the index @n is out of bounds, an error is raised.fMReturn the element at a specific index from an array without bounds checking.NReading from invalid memory can return unpredictable and invalid values. use e if unsure.gread a cell in a mutable array.2If the index is out of bounds, an error is raised.h<read from a cell in a mutable array without bounds checking.NReading from invalid memory can return unpredictable and invalid values. use g if unsure.i#Write to a cell in a mutable array.2If the index is out of bounds, an error is raised.j;write to a cell in a mutable array without bounds checking.^Writing with invalid bounds will corrupt memory and your program will become unreliable. use i if unsure.k%Freeze a mutable array into an array..the MArray must not be changed after freezing.lThaw an immutable array.)The Array must not be used after thawing.m!Thaw an array to a mutable array.the array is not modified, instead a new mutable array is created and every values is copied, before returning the mutable array.n'Copy the element to a new element arrayoECopy a number of elements from an array to another array with offsetspCopy nu sequential elements from the specified offset in a source array to the specified position in a destination array.mThis function does not check bounds. Accessing invalid memory can return unpredictable and invalid values.qaAllocate a new array with a fill function that has access to the elements of the source array.r&Create a new mutable array of size @n.Ball the cells are uninitialized and could contains invalid values.|All mutable arrays are allocated on a 64 bits aligned addresses and always contains a number of bytes multiples of 64 bits.sCreate a new array of size /n by settings each cells through the function f.t7Append 2 arrays together by creating a new bigger arrayJuvwdefghijklmxnodestination arrayoffset at destination source arrayoffset at sourcenumber of elements to copypdestination arrayoffset at destination source arrayoffset at sourcenumber of elements to copyq Source arrayLength of the destination array4Function called for each element in the source arrayReturns the filled new arrayrsthe size of the array,the function that set the value at the indexthe array createdyz{|}~t fjklmxnopr{Huvwdefghijklmxnopqrsyz{|}~tJ BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DR5Return the element at a specific index from a Bitmap.5If the index @n is out of bounds, an error is raised.MReturn the element at a specific index from an array without bounds checking.NReading from invalid memory can return unpredictable and invalid values. use  if unsure.&make an array from a list of elements.transform an array to a list."Check if two vectors are identicalCompare 2 vectors7Append 2 arrays together by creating a new bigger arrayTODO completely non optimized= ;K BSD-style.Alfredo Di Napoli <alfredo.dinapoli@gmail.com> experimentalportableNone )0ABDORTReturns the length of this 8, by summing each inner length. Complexity: O(n) where n0 is the number of chunks, as U.length u is O(1).Returns >* if the given element is contained in the . Complexity: O(n) where n0 is the number of chunks, as U.length u is O(1).TODO: Improve implementation.TODO: Improve implementation.Equality between X. This function is fiddly to write as is not enough to compare for equality the inner I/(s), we need an element-by-element comparison.$Take the first n elements from this . TODO: Perform compaction? Compacting the underlying chunks will have the snag of copying data, but the pro of improving cache-friendliness and reduce data scattering.$ #  BSD-styleHaskell Foundation experimentalportableNone )0:BDIR7Opaque packed array of characters in the ASCII encoding GCreate a string composed of a number @n of Chars (Unicode code points).<if the input @s contains less characters than required, then SCreate a string with the remaining Chars after dropping @n Chars from the beginning :Split on the input string using the predicate as separatore.g. splitOn (== ',') "," == ["",""] splitOn (== ',') ",abc," == ["","abc",""] splitOn (== ':') "abc" == ["abc"] splitOn (== ':') "abc::def" == ["abc","","def"] splitOn (== ':') "::abc::def" == ["","","abc","","def"]  size in bytesCopy the AsciiString:Allocate a MutableAsciiString of a specific size in bytes.cConvert a Byte Array representing UTF8 data directly to a string without checking for UTF8 validitycIf the input contains invalid sequences, it will trigger runtime async errors when processing data.In doubt, use  fromBytes0     !$in number of bytes, not of elements."#$%&'()* -     !"#$%&'()*LNone)0DR+Mutable Byte Array alias+,-.+,-.+,-.M BSD-style Foundation experimentalportableNone)0:DR/Zthe unit element use for the encoding. i.e. Word8 for ASCII7 or UTF8, Word16 for UTF16...0Idefine the type of error handling you want to use for the next function. %type Error UTF8 = Either UTF8_Invalid1nconsume an `Unit encoding` and return the Unicode point and the position of the next possible `Unit encoding`2Yhelper to convert a given Array in a given encoding into an array with another encoding.tThis is a helper to convert from one String encoding to another. This function is (quite) slow and needs some work.z``` let s16 = ... -- string in UTF16 -- create s8, a UTF8 String let s8 = runST $ convertWith UTF16 UTF8 (toBytes s16) print s8 ```3/0142Input's encoding typeOutput's encoding typethe input raw array3/01423/0142N BSD-style Foundation experimentalportableNone)0BDR5>validate a given byte is within ASCII characters encoring size+This function check the 8th bit is set to 06fconsume an Ascii7 char and return the Unicode point and the position of the next possible Ascii7 char 789:;5<6method to access a given byteindex of the byte_either successfully validated the ASCII char and returned the next index or fail with an error=\expecting it to be a valid Ascii character. otherwise this function will throw an exception>?789:;789:;5<6=>?O BSD-style Foundation experimentalportableNone)0BDR @ABCDEFGH@ABCD@ABCDEFGHP BSD-style Foundation experimentalportableNone)0BDRIJKLMNOPIKLIJKLMNOPQ BSD-style Foundation experimentalportableNone)0BDR QRSTUVWXYQRSTQRSTUVWXYR BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0:BDIRZADifferent way to encode a Character in UTF8 represented as an ADT6Opaque packed array of characters in the UTF8 encoding["Validate a bytearray for UTF8'nessUOn success Nothing is returned On Failure the position along with the failure reason\GCreate a string composed of a number @n of Chars (Unicode code points).<if the input @s contains less characters than required, then]SCreate a string with the remaining Chars after dropping @n Chars from the beginning^CReturn the offset (in bytes) of the N'th sequence in an UTF8 String_:Split on the input string using the predicate as separatore.g. splitOn (== ',') "," == ["",""] splitOn (== ',') ",abc," == ["","abc",""] splitOn (== ':') "abc" == ["abc"] splitOn (== ':') "abc::def" == ["abc","","def"] splitOn (== ':') "::abc::def" == ["","","abc","","def"]`Split at a given index.aAllocate a new StringI with a fill function that has access to the characters of the source String.b size in bytescCopy the Stringd5Allocate a MutableString of a specific size in bytes.=Convert a ByteArray to a string assuming a specific encoding.It returns a 3-tuple of:@The string that has been succesfully converted without any errorAn optional validation errorThe remaining buffer that hasn't been processed (either as a result of an error, or because the encoded sequence is not fully available)Considering a stream of data that is fetched chunk by chunk, it's valid to assume that some sequence might fall in a chunk boundary. When converting chunks, if the error is Nothing and the remaining buffer is not empty, then this buffer need to be prepended to the next chunk*Convert a UTF8 array of bytes to a String.qIf there's any error in the stream, it will automatically insert replacement bytes to replace invalid sequences.In the case of sequence that fall in the middle of 2 chunks, the remaining buffer is supposed to be preprended to the next chunk, and resume the parsing.cConvert a Byte Array representing UTF8 data directly to a string without checking for UTF8 validitycIf the input contains invalid sequences, it will trigger runtime async errors when processing data.In doubt, use 6Convert a String to a bytearray in a specific encodingeif the encoding is UTF8, the underlying buffer is returned without extra allocation or any processingJIn any other encoding, some allocation and processing are done to convert.ZZefghijklmn[opqrstuvwxyz{|\]}^~_`a Source string)Length of the destination string in bytes7Function called for each character in the source StringReturns the filled new stringbcd$in number of bytes, not of elements.mocKZefghijklmn[opqrstuvwxyz{|\]}^~_`abcd  BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone )0BDR GI IGSNone)0DR 9Incremental Hashing state. Represent an hashing algorithm$the base primitive of this class is ", append mix a Word8 in the stateThe class allow to define faster mixing function that works on bigger Word size and any unboxed array of any PrimType elements.Associate type when finalizing the state with Create a new Hashing context.Finalize the state and returns the hash result:Mix a Word8 (Byte) into the state and return the new state4Mix a Word16 into the state and return the new state4Mix a Word32 into the state and return the new state4Mix a Word64 into the state and return the new state=Mix an arbitrary sized unboxed array and return the new state  T BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalgoodNone )0BDIRFNV1(a) hash (64 bit variants)FNV1(a) hash (32 bit variants)6compute FNV1 (32 bit variant) of a raw piece of memory7compute FNV1a (32 bit variant) of a raw piece of memory6compute FNV1 (64 bit variant) of a raw piece of memory7compute FNV1a (64 bit variant) of a raw piece of memoryU BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalgoodNone )0BDR5Sip State 1-3 (1 compression rounds, 3 digest rounds)5Sip State 2-4 (2 compression rounds, 4 digest rounds)Siphash Hash value SigHash Keysame as hash], except also specifies the number of sipround iterations for compression (C) and digest (D).# BSD-style experimentalGoodNone)0DRRNG based on ChaCha core.The algorithm is identical to the arc4random found in recent BSDs, namely a ChaCha core provide 64 bytes of random from 32 bytes of key.GAn alias to the default choice of deterministic random number generatorUnless, you want to have the stability of a specific random number generator, e.g. for tests purpose, it's recommended to use this alias so that you would keep up to date with possible bugfixes, or change of algorithms.[A simple Monad class very similar to a State Monad with the state being a RandomGenerator.,A Deterministic Random Generator (DRG) class!Initialize a new random generator)Generate N bytes of randomness from a DRG7A monad constraint that allows to generate random bytes6Run a pure computation with a Random Generator in the    BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DRV BSD-style Foundation experimentalportableNone)0DR!Print a string to standard output0Print a string with a newline to standard output BSD-style foundation experimentalportableNone)0DR'errors related to FileName manipulation0this means a null byte was found in the FileName5this means a path separator was found in the FileNameencoding error"some unknown trainling bytes found+A filename (or path entity) in the FilePath  Authorised"""."".." "foundation" Unauthorised"/""file/""/file" "file/path")error associated to filepath manipulation2this mean there were 2 contiguous path separators.9This is not valid in Foundation's FilePath specifications$FilePath is a collection of FileNameTODO: Eq and Ord are implemented using Show This is not very efficient and would need to be improved Also, it is possible the ordering is not necessary what we want in this case.#A FilePath is one of the following:  An Absolute:#starts with one of the follwing "/" A relative:don't start with a "/" authorised:"/""filepath"".""..""workhaskellhs-foundation" unauthorised"path//""information about type of FilePathA file path being only  or ..define the Path separator for POSIX systems : / convert a FileName into a String?This function may throw an exception associated to the encoding*conversion of FileName into a list of Char"this function may throw exceptions,conversion of a FilePath into a list of Char"this function may throw exceptions/build a file path from a given list of filename7this is unsafe and is mainly needed for testing purpose(build a file name from a given ByteArray7this is unsafe and is mainly needed for testing purpose)   2 BSD-style foundation experimentalportableNone)0DR !"#$% !#"$%W BSD-style Foundation experimentalportableNone)0DR 2list the file name in the given FilePath directoryqTODO: error management and not implemented yet getDirectory :: FilePath -> IO [FileName] getDirectory = undefinedOpen a new handle on the fileClose a handle-Read binary data directly from the specified .First argument is the Handle to read from, and the second is the number of bytes to read. It returns the bytes read, up to the specified size, or an empty array if EOF has been reached. is implemented in terms of hGetBuf.hGetNonBlocking is similar to , except that it will never block waiting for data to become available, instead it returns only whatever data is available. If there is no data available to be read,  returns an empty array.7Note: on Windows, this function behaves identically to .Like , except that a shorter array may be returned if there are not enough bytes immediately available to satisfy the whole request. N only blocks if there is no data available, and EOF has not yet been reached. filepath mode act opens a file using the mode and run acta. the by-product handle will be closed when act finish, either normally or through an exception.(The value returned is the result of act@IRead a binary file and return the whole content in one contiguous buffer.oFold over chunks file calling the callback function for each chunks read from the file, until the end of file.  Fold callback functioninitial accumulator File to read ^]\[Z    BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DR ^]\[Z  ^]\[Z X BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DRgContains all the information related to a file mapping, including the size and the finalizer function.kFrom a file mapping, create a final ptr which will automatically unmap memory when the pointer is garbage.   Y(c) Vincent Hanquez 2014 BSD-styleVincent Hanquez provisionalnon-portable (requires POSIX)None)0DR Memory synchronization flags perform asynchronous write. perform synchronous write. invalidate cache data.Advice to put on memory.only define the posix one. no specific advice, the default.BExpect page references in random order. No readahead should occur.RExpect page references in sequential order. Page should be readahead aggressively.IExpect access in the near future. Probably a good idea to readahead early(Do not expect access in the near future.Memory protection Mapping flag)memory changes are shared between process%memory changes are private to processMap pages of memory.vIf fd is present, this memory will represent the file associated. Otherwise, the memory will be an anonymous mapping.use mmapUnmap pages of memoryuse munmap7give advice to the operating system about use of memorycall madvise%lock a range of process address spacecall mlock'unlock a range of process address spacecall munlock set protection of memory mappingcall mprotect4memorySync synchronize memory with physical storage.FOn an anonymous mapping this function does not have any effect. call msync&Return the operating system page size.call sysconf'     !"#$%&'()*+,-*The address to map to if MapFixed is used.The length of the mapping1the memory protection associated with the mapping./0     !"#0     !"#$%&'()*+,-./0ZNone)0DR 0 BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DR*Map in memory the whole content of a file.COnce the array goes out of scope, the memory get (eventually) unmap*Map in memory the whole content of a file,11 BSD-style foundation experimentalportableNone)0DR4Enumeration of the known GHC supported architecture.'9get the operating system on which the program is running.Either return the known ! or a strict  of the OS name.This function uses the base's 2 function.(<get the machine architecture on which the program is running1Either return the known architecture or a Strict  of the architecture name.This function uses the base's 3 function.)get the compiler nameKget the compilerName from base package but convert it into a strict String**returns the number of CPUs the machine has+&endianness of the current architecture !"#$%&'()*+DJIHG !"#$%&'()*+!"#$%&' (*+)DJIHG !"#$%&'()*+ BSD-styleHaskell Foundation experimentalportableNone )0:DORT:Simple parser structure4?The continuation of the next buffer value, and the parsed value5<The continuation of the current buffer, and the error string=3Simple parsing result, that represent respectively:failure: with the error message+continuation: that need for more input data9success: the remaining unparsed data and the parser valueC&not enough data to complete the parserD,only use in the event of Monad.fail functionEthe expected inputFbut received this dataG"Run a parser on an @initial input.|If the Parser need more data than available, the @feeder function is automatically called and fed to the More continuation.H*Run a Parser on a ByteString and return a =J,Get the next `Element input` from the parserK4Parse a specific `Element input` at current position]if the `Element input` is different than the expected one, this parser will raise a failure.L2Parse a sequence of elements from current position;if the following `Element input` don't match the expected input, completely, the parser will raise a failureN8Take @n elements from the current position in the streamOPTake elements while the @predicate hold from the current position in the streamPCTake the remaining elements from the current position in the streamQ8Skip @n elements from the current position in the streamRWSkip `Element input` while the @predicate hold from the current position in the streamSOSkip all the remaining `Element input` from the current position in the stream&:;<45=>?@ABCDEFGH678IJKLMNOPQRSTUVWXYZP:;<=>?@ADBCEFGHIJKLMNOPQRS:;<=>?@ABCDEFHGIKJLMNOPQRSP:;<45=>?@ABCDEFGH678IJKLMNOPQRSTUVWXYZ[ BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)05DR^0Class of product types that have a third elementa1Class of product types that have a second elementd0Class of product types that have a first elementgStrict tuple (a,b,c,d)iStrict tuple (a,b,c)kStrict tuple (a,b) ^_`abcdefghijkl9:;<=>?@ABCDEFGHI^_`abcdefghijkl^_`abcdefghijkl9:;<=>?@ABCDEFGHI\ BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalgoodNone)0DRm"Type with the ability to be hashedHashable doesn't have any specific rules, and it's made for raw speed. More specifically don't expect different type representing the same data to hash to the same value .hashMix (1 :: Integer) /= hashMix (1 :: Word8)TruemnJKLMNOPQRSTUVWXYZ[\]^mnmnJKLMNOPQRSTUVWXYZ[\]^ BSD-style FoundationNone)0DR mn mn BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone ),09;<=DRoRA generalized version of indexed accessor allowing access to tuples n'th element.Indexing starts at 1, as f is used to get first element.opqrstuvwxyz{|}~opqopqopqrstuvwxyz{|}~ BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNone)0DR:Alias to Prelude String ([Char]) for compatibility purpose&Use the Show class to create a String.yNote that this is not efficient, since an intermediate [Char] is going to be created before turning into a real String.XReturns a list of the program's command line arguments (not including the program name).Ejiklnm  !"#$%&;>'()*+,-./0<=1ABC2345678:?@FNLKMORQSUYXWV_`abcedfghopqrstuvwxyz{|}~I^a_`buvwz{xy|~^_`abcdefghijkl|Qklijghdefabc^_`Rvb}~xyw{z! jinmlk NMLK$ #E0<=1ABC&;>'3:?@+,-.56784*/F2)(Ih%Suvwxyz{|~^_`abopsutqr_a`fgOYXWV"Uedc_]^_`ab`ac`de`df`dg`dh]ij]ik`al`am`an`ao`ap`qr`st`su`vw`vx`vy`vz`a{`a|`a}`a~`a`a`d`d]i`a`a]i```q`a`a]]]]]`````a]`s]]``````]`a`a]``]]]``v```````````````````````````````````s`d`d`d`d`d`d````````````a`a`a`a`a`a`a`a`a`a`a```]i]i]i]i ]i ]i ]i ]i ]i]i""""""&&&&' '!'"'#($(%(&(')()))**+*,*-*.*/*0*1*2*3*4*5+6+6+7+7,8,9,:,;,<,=>?@ABCDEFGHIJKLMNOPQRS-T U V W X Y Z [ \.].^._.`.a.b.c.d.e/f/g/h/i/j/k/l/mnopqrstuvwxyz{|}~0000000000445555<<>>>>>>?1@@@@@@@@@@@@@@AAAAABBBCCDDDDDDDDDDDDDEEEEEEEEEEEFFFFFFFFFFFFFFFFFFFFFFFFF F F F F GGGGGGGGGGGGGGGGGGG G!"I#I$J%J&K'()*+,-./0123456789R:R;R<R=R>R?R@RARBRCRDRERFR-R)R.R/SGTHTITJTKULUMNOPPQRSTUVWXYZ[\]V^V_`3abcdefghijklmnopqrstuvwWxWyWzW{W|W}~[[[[[[[[[[[[[[[\\````]" " " " " """"""""""""""""""" "!"""#"$"%"&"'"(")"*"+",%-%.%/%0```12`13`14`15`16`17`18`19`1:`1;`1<`1=`1>`1?`1@`A``B`CD`CE`CF`CG``1H`1I`JK`LM`N&O&&P&&&Q&R&S'T'U'V'W'X'Y'Z'['\']'^'_'`'a'b'c'd'e(f(g(h(i(j(k(l(m(n(o(p(q(r(s(t)u)v)w)x)y)z){)|)})~))))********************************++++++++++++++++++++,,--------T------........////////////////////////  566677777777777888888888888999999999::::::;`<<< < < < < <<<<<<<<======>+>>>>>>>>>,> >!>">#>$>>%>&>'>(>)>*>+>>,>->.>>/>0>1>2>3>>>>>4>>>>>5>>>>>>>6>7>>>>>>>>>>>>8>9>:>;><>=`>?`>?`>@`>@`>A`>A`>B`>B`>C`>C`>D`>D`>E`>E`>F`>F`>G`>G`>H`>H`>I`>I`>J`>J`>K`>K`>L`>L`>M`>M`>N`>N`>O`>O`>P`>P`>Q`>Q`>R`>R`>S`>S`>T`>U`>V`>W`>W`>X`>X`>Y`>Y`>Z`>Z@[A\A]B^B_C`CaDbEEcEdEeEfFgFhFiGjGkGlGmGnGoGpGqGrGsGtGuGvGwGxHyHzH{IIIIII I IIII+I III I,II#I$I&II#I$I.II*I!I"I/I|IIIIIIIII5IIII6IIIIIIII}I+II~IIIIIIIIIIIIIIIIIIJJJ!J"J#J$JJ%J&JJJJJJJJJ JJ JJJJ.J J/JJJJJJJJ6JJJJJJJJJJJJJJJJJJJJJJJJJKKKKK#KK'K.KK/K!K"KKKKKKKKKKKKKKKKKKKKKKKo (LLLLMMMMM:MNNN;N;NNNNN NNO=O=OOBOOO OOPPP>P>PP PPQ?Q?QQQQQ QQRRRRRRRRRoR+R RRRRRRRRRDRRRRRRRRRR RR+RRRRRRRR5RRRRRR*RR*R,RRRRRRRRRRRRRRRRRRRRRRRRSSSSSSSSSSSTTTTTTTHTITJTKTTTTTTTTTTTTUUUU U U U U UUUUUUUUULUMUUUUUUUUUUUUUUU N!"#$%&'()*+,-`3./0123456`78W9W:W;W<X=X>X?X=X@XAXBYCYDYEYFYGYHYIYJYKYLYMYNYOYPYQYRYSYTYUYVYWYXYYYZY[Y\Y]Y^Y_Y`YaYbYcYdYeYfYgYhY~i``jklmn[o[p[q[r[s[t[u[v[w[x[y[z[{[|[}[~[\\\\\\\\\\\\\\\\\\\\\'foundation-0.0.2-B6ESyPDDrgE9iZ15WSlSSc FoundationFoundation.Class.StorableFoundation.System.InfoFoundation.Class.BifunctorFoundation.Parser Foundation.IOFoundation.StrictFoundation.NumericalFoundation.ArrayFoundation.BitsFoundation.ConvertibleFoundation.PrimitiveFoundation.ForeignFoundation.VFS.PathFoundation.VFS.URIFoundation.Math.TrigonometryFoundation.CollectionFoundation.Array.InternalFoundation.System.EntropyFoundation.String.ASCIIFoundation.StringFoundation.HashingFoundation.RandomFoundation.VFS.FilePathFoundation.IO.FileMapFoundation.Tuple.NthFoundation.Internal.PrimTypesFoundation.Internal.IdentityFoundation.Internal.CallStackFoundation.Numerical.PrimitivesFoundation.Internal.PrimitiveFoundation.String.InternalFoundation.Internal.NaturalFoundation.Internal.NumLiteralFoundation.Internal.ProxyFoundation.Internal.IsListFoundation.Internal.BaseFoundation.PartialFoundation.Numerical.NumberFoundation.Numerical.Additive Foundation.Numerical.Subtractive#Foundation.Numerical.MultiplicativeFoundation.Internal.TypesFoundation.Numerical.FloatingFoundation.Array.CommonFoundation.Primitive.MonadFoundation.Primitive.TypesFoundation.Primitive.FinalPtrElementFoundation.VFSFilePathURIFoundation.Collection.Keyed Foundation.System.Entropy.CommonFoundation.System.Entropy.UnixFoundation.Internal.MonadTransFoundation.String.UTF8TableFoundation.Collection.ListFoundation.Internal.Environment Foundation.Array.Unboxed.MutableFoundation.Primitive.UtilsFoundation.Array.UnboxedFoundation.Collection.ElementFoundation.Collection.BuildableFoundation.Collection.FoldableFoundation.Collection.Indexed"Foundation.Collection.InnerFunctorFoundation.Collection.Mutable Foundation.Collection.Collection Foundation.Collection.SequentialFoundation.Collection.ZippableFoundation.String.ModifiedUTF8Foundation.Array.BoxedFoundation.Array.Bitmap Foundation.Array.Chunked.Unboxed"Foundation.Array.Unboxed.ByteArray#Foundation.String.Encoding.Encoding!Foundation.String.Encoding.ASCII7 Foundation.String.Encoding.UTF16 Foundation.String.Encoding.UTF32%Foundation.String.Encoding.ISO_8859_1Foundation.String.UTF8Foundation.Hashing.HasherFoundation.Hashing.FNVFoundation.Hashing.SipHashFoundation.IO.TerminalFoundation.IO.File"Foundation.Foreign.MemoryMap.Types"Foundation.Foreign.MemoryMap.PosixFoundation.Foreign.MemoryMapFoundation.TupleFoundation.Hashing.Hashableghc-primGHC.PrimseqbaseGHC.Base otherwise$GHC.EnumenumFrom enumFromThen enumFromToenumFromThenTo GHC.Classes==>=fail>>=>>fmapreturn Data.String fromStringGHC.Real fromIntegral realToFracGHC.ExtsIsListfromList fromListNtoListmemptymappendmconcat<*>pure*>BoundedEnumEqMonadFunctorOrdGHC.ShowShowData.Typeable.InternalTypeableIsString ApplicativeMonoid GHC.TypesBoolCharDoubleFloatIntGHC.IntInt8Int16Int32Int64 integer-gmpGHC.Integer.TypeIntegerMaybeOrderingRationalIOWordGHC.WordWord8Word16Word32Word64GHC.PtrPtr Data.EitherEitherFalseNothingJustTrueLeftRightLTEQGT System.InfocompilerVersionItem GHC.NaturalNatural Data.Version versionTags versionBranchVersionData.Bifunctorsecondfirstbimap Bifunctor Control.Monad>=>Control.ApplicativeoptionalControl.Category.id Data.Monoid<>castPtrGHC.IO.Exception IOException GHC.ExceptiondisplayException fromException toException Exception GHC.IO.IOMode ReadWriteMode AppendMode WriteModeReadModeIOModepartitionEithersrightsleftseither Data.Proxy asProxyTypeOfProxy Data.Functionon Data.Functor<$>^^maxBoundminBoundfromEnumtoEnumpredsucc Data.MaybemapMaybe catMaybes listToMaybe maybeToList fromMaybe isNothingisJustmaybe Data.TupleswapuncurrycurryasTypeOfuntil$!flipconst=<<<$<*manysome<|>GHC.Err undefinederror SomeException/=compare<=&&||not<>maxminstrict1strict2strict3strict4strict5strict6 HasNegationnegate Fractional fromRationalIntegral fromInteger PartialErrorPartialpartial fromPartial IsNatural toNatural IsIntegral toIntegerAdditiveazero+scale Subtractive Difference- Divisible/ IDivisibledivmoddivModMultiplicative midentity*^recipSizeOffset FloatingPoint floatRadix floatDigits floatRange floatDecode floatEncodeIntegralRoundingroundUp roundDown roundTruncate roundNearestSignedabssignumSign SignNegativeSignZero SignPositive$fIntegralRoundingFloat$fIntegralRoundingDouble$fIntegralRoundingRatio $fSignedInt64 $fSignedInt32 $fSignedInt16 $fSignedInt8 $fSignedInt$fSignedInteger$fEqSign OutOfBound.<<..>>. alignRoundUpalignRoundDown ConvertibleConvertconvert$fConvertibleaa PrimMonad PrimStatePrimVar primitive primThrow unPrimMonad primVarNew primVarRead primVarWritePrimTypeprimSizeInBytes primBaUIndex primMbaURead primMbaUWrite primAddrIndex primAddrRead primAddrWrite StorableFixedsize alignmentStorablepeekpokeplusPtrpeekOffpokeOff$fStorableFixedWord64$fStorableFixedWord32$fStorableFixedWord16$fStorableFixedWord8$fStorableFixedInt64$fStorableFixedInt32$fStorableFixedInt16$fStorableFixedInt8$fStorableFixedFloat$fStorableFixedDouble$fStorableFixedChar$fStorableWord64$fStorableWord32$fStorableWord16$fStorableWord8$fStorableInt64$fStorableInt32$fStorableInt16$fStorableInt8$fStorableFloat$fStorableDouble$fStorableCharFinalPtr FinalForeignfinalPtrSameMemory toFinalPtrtoFinalPtrForeign castFinalPtrwithFinalPtrNoTouch withFinalPtrwithUnsafeFinalPtrPathPathEnt PathPrefix PathSuffix splitPath buildPathparentfilenameprefixsuffixURIPath URIFragmentURIQuery URIAuthority URISchema $fPathURI Trigonometrypisincostanasinacosatansinhcoshtanhasinhacoshatanh$fTrigonometryDouble$fTrigonometryFloatKeyedCollectionKeyValuelookupMUArraymutableForeignMemUArrayUVecBAUVecAddr foreignMemfromForeignPtrrecast BuildingState prevChunksprevChunksSizecurChunk chunkSizeBuilder runBuilder BuildableMutableStepappendbuildFoldablefoldlfoldl'foldrfoldr'IndexedCollection! findIndex InnerFunctorimapMutableCollectionMutableFreezed MutableKey MutableValue unsafeThaw unsafeFreezethawfreezemutNewmutUnsafeWritemutWrite mutUnsafeReadmutRead CollectionnulllengthelemnotElemmaximumminimumNonEmpty getNonEmptynonEmpty nonEmpty_ SequentialtakerevTakedroprevDropsplitAt revSplitAtsplitOnbreak breakElem intersperse intercalatespanfilter partitionreverseunconsunsnocsnocconsfindsortBy singletonheadlasttailinit isPrefixOf isSuffixOf BoxedZippablezipzip3zip4zip5zip6zip7unzipunzip3unzip4unzip5unzip6unzip7ZippablezipWithzipWith3zipWith4zipWith5zipWith6zipWith7 getEntropyMArrayArray MutableBitmapBitmap ChunkedUArray AsciiStringtoBytes replicatecopycreatefromBytesUnsafelineswords$fZippableAsciiString$fSequentialAsciiString$fCollectionAsciiString$fInnerFunctorAsciiString$fIsListAsciiString$fIsStringAsciiString$fShowAsciiString$fMonoidAsciiString$fEqAsciiString$fOrdAsciiStringEncodingASCII7UTF8UTF16UTF32 ISO_8859_1ValidationFailure InvalidHeaderInvalidContinuation MissingByteString fromBytesfromBytesLenientHasherFNV1a_64FNV1a_32FNV1_64FNV1_32Sip1_3Sip2_4RNGv1RNGMonadRandomStaterunRandomState RandomGen randomNewrandomGenerate MonadRandomgetRandomByteswithRandomGenerator$fRandomGenRNGv1$fMonadRandomMonadRandomState$fMonadMonadRandomState$fApplicativeMonadRandomState$fFunctorMonadRandomState$fMonadRandomIOputStrputStrLnFileName RelativityAbsoluteRelativefilePathToStringfilePathToLStringunsafeFilePathunsafeFileName extension$fPathFilePath$fMonoidFileName$fIsStringFileName$fShowFileName$fExceptionFileName_Invalid$fIsStringFilePath$fExceptionFilePath_Invalid $fOrdFilePath $fEqFilePath$fShowFilePath$fEqRelativity$fShowRelativity$fShowFilePath_Invalid $fEqFileName$fShowFileName_InvalidopenFile closeFilehGetwithFilereadFile foldTextFile fileMapReadfileMapReadWith Endianness LittleEndian BigEndianArchI386X86_64PowerPC PowerPC64SparcSparc64ARMARM64OSWindowsOSXLinuxAndroidBSDosarch compilerNamecpus endianness$fShowOS$fEqOS$fOrdOS$fEnumOS $fBoundedOS$fDataOS $fShowArch$fEqArch $fOrdArch $fEnumArch $fBoundedArch $fDataArch$fEqEndianness$fShowEndiannessParser runParserResult ParseFail ParseMoreParseOK ParserErrorExpected NotEnough MonadFail expectedInput receivedInput parseFeedparsehasMore anyElementelementelementsstring takeWhiletakeAllskip skipWhileskipAll$fAlternativeParser$fMonadPlusParser $fMonadParser$fApplicativeParser$fFunctorParser $fShowResult$fExceptionParserError$fShowParserError$fEqParserError$fOrdParserErrorThdable ProductThirdthdSndable ProductSecondsndFstable ProductFirstfstTuple4Tuple3Tuple2HashablehashMixNthableNthTynth$fNthable4Tuple4$fNthable3Tuple4$fNthable2Tuple4$fNthable1Tuple4$fNthable4(,,,)$fNthable3(,,,)$fNthable2(,,,)$fNthable1(,,,)$fNthable3Tuple3$fNthable2Tuple3$fNthable1Tuple3$fNthable3(,,)$fNthable2(,,)$fNthable1(,,)$fNthable2Tuple2$fNthable1Tuple2 $fNthable2(,) $fNthable1(,)LStringshowgetArgsSize#Offset# FileSize#Data.Functor.IdentityIdentity runIdentityGHC.Stack.Types HasCallStackIntegralConvertintegralConvert intToWord$fIntegralConvertInt64Word64$fIntegralConvertInt32Word32$fIntegralConvertInt16Word16$fIntegralConvertInt8Word8 PinnedStatusbool# compatAndI#compatQuotRemInt#compatCopyAddrToByteArray# compatMkWeak#isPinnedpinnedunpinned compatGetSizeofMutableByteArray#compatShrinkMutableByteArray#compatResizeMutableByteArray#W#$fFractionalCDouble$fFractionalCFloat$fFractionalDouble$fFractionalFloat$fFractionalRatio$fHasNegationCInt$fHasNegationWord64$fHasNegationWord32$fHasNegationWord16$fHasNegationWord8$fHasNegationWord$fHasNegationInt64$fHasNegationInt32$fHasNegationInt16$fHasNegationInt8$fHasNegationInt$fHasNegationInteger$fIntegralCDouble$fIntegralCFloat$fIntegralDouble$fIntegralFloat$fIntegralCOff$fIntegralCInt$fIntegralCSize$fIntegralInt64$fIntegralInt32$fIntegralInt16$fIntegralInt8$fIntegralWord64$fIntegralWord32$fIntegralWord16$fIntegralWord8$fIntegralWord $fIntegralInt$fIntegralNatural$fIntegralInteger internalError ifThenElseFP64FP32 Data.DataDatagfoldlgunfoldtoConstr dataTypeOf dataCast1 dataCast2gmapTgmapQlgmapQrgmapQgmapQigmapMgmapMpgmapMo showsPrecshowList GHC.GenericsGenericRepfromto mkNoRepTypeDataType Data.FoldableandGHC.IOthrowIOthrow partialErrorfromJust fromRightfromLeft$fExceptionPartialError$fIsNaturalWord64$fIsNaturalWord32$fIsNaturalWord16$fIsNaturalWord8$fIsNaturalWord$fIsNaturalNatural$fIsIntegralWord64$fIsIntegralWord32$fIsIntegralWord16$fIsIntegralWord8$fIsIntegralWord$fIsIntegralNatural$fIsIntegralInt64$fIsIntegralInt32$fIsIntegralInt16$fIsIntegralInt8$fIsIntegralInt$fIsIntegralIntegerscaleNum$fAdditiveDouble$fAdditiveFloat$fAdditiveWord64$fAdditiveWord32$fAdditiveWord16$fAdditiveWord8$fAdditiveNatural$fAdditiveWord$fAdditiveInt64$fAdditiveInt32$fAdditiveInt16$fAdditiveInt8 $fAdditiveInt$fAdditiveInteger$fSubtractiveDouble$fSubtractiveFloat$fSubtractiveWord64$fSubtractiveWord32$fSubtractiveWord16$fSubtractiveWord8$fSubtractiveWord$fSubtractiveNatural$fSubtractiveInt64$fSubtractiveInt32$fSubtractiveInt16$fSubtractiveInt8$fSubtractiveInt$fSubtractiveIntegerpowereven$fDivisibleDouble$fDivisibleFloat$fDivisibleRatio$fIDivisibleWord64$fIDivisibleWord32$fIDivisibleWord16$fIDivisibleWord8$fIDivisibleWord$fIDivisibleNatural$fIDivisibleInt64$fIDivisibleInt32$fIDivisibleInt16$fIDivisibleInt8$fIDivisibleInt$fIDivisibleInteger$fMultiplicativeRatio$fMultiplicativeDouble$fMultiplicativeFloat$fMultiplicativeWord64$fMultiplicativeWord32$fMultiplicativeWord16$fMultiplicativeWord8$fMultiplicativeWord$fMultiplicativeNatural$fMultiplicativeInt64$fMultiplicativeInt32$fMultiplicativeInt16$fMultiplicativeInt8$fMultiplicativeInt$fMultiplicativeIntegerSize8Offset8FileSize+. offsetOfE offsetPlusE offsetMinusE offsetRecastsizeOfE$fSubtractiveSize$fAdditiveSize$fIsNaturalSize$fIsIntegralSize$fIntegralSize$fSubtractiveOffset$fAdditiveOffset$fIsNaturalOffset$fIsIntegralOffset$fIntegralOffset$fFloatingPointDouble$fFloatingPointFloatorderingToSignOutOfBoundOperation InvalidRecastRecastDestinationSizeRecastSourceSizeOOB_Read OOB_Write OOB_MemSet OOB_Index$fExceptionInvalidRecast$fExceptionOutOfBound unPrimMonad_unsafePrimCastunsafePrimToSTunsafePrimToIOunsafePrimFromIO primTouch $fPrimMonadST $fPrimMonadIO sizeRecast primBaIndex primMbaRead primMbaWriteprimArrayIndexprimMutableArrayReadprimMutableArrayWriteprimOffsetRecast primOffsetOfE sizeAsOffset offsetAsSize$fPrimTypeCUChar$fPrimTypeCChar$fPrimTypeChar$fPrimTypeDouble$fPrimTypeFloat$fPrimTypeInt64$fPrimTypeInt32$fPrimTypeInt16$fPrimTypeInt8$fPrimTypeWord64$fPrimTypeWord32$fPrimTypeWord16$fPrimTypeWord8toProxy$fKeyedCollection[]EntropySystemMissing$fExceptionEntropySystemMissing entropyGather EntropyCtxEntropySyscallc_sysrandom_linux entropyOpen entropyCloseentropyMaximumSizeopenDevgatherDevEntropysupportSyscallReaderState runReaderrunState $fMonadReader$fApplicativeReader$fFunctorReader $fMonadState$fApplicativeState$fFunctorStateisContinuation getNbBytesisContinuation# getNbBytes#TableunTable contTable headTable wordsWhenunsafeUArrayUnpinnedMaxSize GHC.IO.UnsafeunsafePerformIOread unsafeReadwrite unsafeWrite newPinnednewcopyAt mutableLengthMUVecMA MUVecAddrmutableArrayProxyTysizeInMutableBytesOfContent newUnpinned mutableSame newNativeprimCopyFreezedBytesprimCopyFreezedBytesOffsetprimCopyFreezedW32primCopyFreezedW64 primMutableByteArraySlideToStartprimMutableAddrSlideToStartindex unsafeIndexunsafeCopyAtROunsafeCopyFrom createFromIO vFromListvToListequalvCompareupdate arrayType vectorProxyTy unsafeIndexer unsafeDewrap lengthSizeunsafeFreezeShrink freezeShrink unsafeSlideemptyconcat unsafeUpdatewithPtrwithMutablePtr unsafeRecast splitElemsubmapmapIndex$fIsListUArray$fMonoidUArray $fOrdUArray $fEqUArray $fShowUArray $fDataUArrayForeign.C.TypesCCharCSCharCUCharCShortCUShortCIntCUIntCLongCULongCLLongCULLongCFloatCDoubleCPtrdiffCSizeCWchar CSigAtomicCClockCTime CUSeconds CSUSecondsCFileCFposCJmpBufCIntPtrCUIntPtrCIntMaxCUIntMax$fBuildableUArray$fFoldableUArray $fFoldable[]$fIndexedCollectionUArray$fIndexedCollection[]$fInnerFunctorUArray$fInnerFunctor[]$fMutableCollectionMUArray$fCollectionNonEmpty$fCollectionUArray$fCollection[]$fIsListNonEmptymconcatCollection$fSequentialUArray$fSequential[]uncons2uncons3uncons4uncons5uncons6uncons7uncurry2uncurry3uncurry4uncurry5uncurry6uncurry7$fBoxedZippable[]$fZippableUArray $fZippable[] fromModified accessBytesbuildByteArray onNewArrayfreezeUntilIndexaFoldlaFoldraFoldl'$fBuildableArray$fBoxedZippableArray$fZippableArray$fIndexedCollectionArray$fMutableCollectionMArray$fSequentialArray$fCollectionArray$fFoldableArray$fInnerFunctorArray $fIsListArray $fOrdArray $fEqArray $fShowArray $fMonoidArray$fFunctorArray $fDataArray bitsPerTy shiftPerTy maskPerTy bitmapIndex unoptimised $fMutableCollectionMutableBitmap$fIndexedCollectionBitmap$fSequentialBitmap$fCollectionBitmap$fFoldableBitmap$fInnerFunctorBitmap$fIsListBitmap$fMonoidBitmap $fOrdBitmap $fEqBitmap $fShowBitmap $fIndexedCollectionChunkedUArray$fSequentialChunkedUArray$fCollectionChunkedUArray$fIsListChunkedUArray$fMonoidChunkedUArray$fEqChunkedUArrayMutableAsciiString ccharToChar charToCCharnextsToList sFromListccharMapMutableByteArraymutableByteArraySetmutableByteArraySetBetweenmutableByteArrayMoveUnitError encodingNext convertFromTo encodingWriteisAsciiASCII7_InvalidByteOutOfBound CharNotAsciiaone$fEncodingASCII7$fExceptionASCII7_Invalid UTF16_InvalidInvalidUnicode$fEncodingUTF16$fExceptionUTF16_Invalid UTF32_Invalid$fEncodingUTF32$fExceptionUTF32_InvalidISO_8859_1_Invalid NotISO_8859_1$fEncodingISO_8859_1$fExceptionISO_8859_1_InvalidUTF8CharvalidateindexN splitIndexUTF8_1UTF8_2UTF8_3UTF8_4 EncoderUTF8 MutableString stringTypemutableValidateskipNextHeaderValuenextWithIndexerwriteWithBuilder asUTF8CharnumBytes writeUTF8Char charToBytescharMapfromEncoderBytesfromChunkBytestoEncoderBytes$fEncodingEncoderUTF8$fExceptionValidationFailure$fBuildableString$fZippableString$fSequentialString$fCollectionString$fInnerFunctorString$fIsListString$fIsStringString $fShowString $fDataStringhashMix8 HashResulthashEndhashNew hashMix16 hashMix32 hashMix64 hashMixBytesunWord16unWord32 unWord64_32 FNV1Hash64 FNV1Hash32 fnv1_32_mixBafnv1a_32_mixBa fnv1_64_mixBafnv1a_64_mixBaxor32xor64 fnv1_32_Mix8 fnv1a_32_Mix8 fnv1_64_Mix8 fnv1a_64_Mix8$fHasherFNV1a_64$fHasherFNV1_64$fHasherFNV1a_32$fHasherFNV1_32SipHashSipKeymixBaSipIncrementalSipIncremental0SipIncremental1SipIncremental2SipIncremental3SipIncremental4SipIncremental5SipIncremental6SipIncremental7 InternalStateSip newSipStatemix8Primmix8mix32mix64finishdoRoundprocessfinalize loopRounds andMask64$fHasherSip1_3$fHasherSip2_4c_rngv1_generate rngv1KeySize rngv1GenerateFileName_InvalidContainsNullByteContainsSeparator EncodingErrorUnknownTrailingBytesFilePath_InvalidContiguousPathSeparatorpathSeparatorPOSIXfileNameToStringfileNameToLStringpathSeparatorPOSIXCpathSeparatorC pathSeparator hasNullByte hasSeparator isSeparatorhasContigueSeparatorsjoinfilenameIntercalateGHC.IO.Handle.TypesHandlehGetNonBlockinghGetSomeinvalidBufferSize blockSize FileMappingfileMappingToFinalPtr FileMapReadFfileMappingPtrfileMappingSizefileMappingUnmapMemorySyncFlagMemorySyncAsyncMemorySyncSyncMemorySyncInvalidate MemoryAdviceMemoryAdviceNormalMemoryAdviceRandomMemoryAdviceSequentialMemoryAdviceWillNeedMemoryAdviceDontNeedMemoryProtection MemoryMapFlagMemoryMapSharedMemoryMapPrivate memoryMap memoryUnmap memoryAdvise memoryLock memoryUnlock memoryProtect memorySyncsysconfPageSizeMemoryProtectionNoneMemoryProtectionReadMemoryProtectionWriteMemoryProtectionExecute c_sysconf c_munlockc_mlock c_mprotectc_msync c_madvisec_munmapc_mmapcvalueOfMemoryProtscvalueOfMemorySyncfileSizeToCSizefileSizeFromIntegergetSizeSuccessFailuregetMoregetAllflushAll$fThdableTuple4$fThdableTuple3$fThdable(,,,) $fThdable(,,)$fSndableTuple4$fSndableTuple3$fSndableTuple2$fSndable(,,,) $fSndable(,,) $fSndable(,)$fFstableTuple4$fFstableTuple3$fFstableTuple2$fFstable(,,,) $fFstable(,,) $fFstable(,)$fBifunctorTuple2$fHashableTuple4$fHashableTuple3$fHashableTuple2$fHashable(,,,,,)$fHashable(,,,,)$fHashable(,,,)$fHashable(,,) $fHashable(,) $fHashable[]$fHashableUArray$fHashableString$fHashableInteger$fHashableInt64$fHashableInt32$fHashableInt16$fHashableInt8$fHashableNatural$fHashableWord64$fHashableWord32$fHashableWord16$fHashableWord8