E3M      !"#$%&'()*+,-./0123456789:;<=>?@ABCDE F G H IJKLMNO P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u vwxyz{|}~   BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalunknownSafe ^.A simple Extended Word128 composed of 2 Word64 BSD-style#Vincent Hanquez <vincent@snarc.org>stableGoodNonekperform io for hashes that do allocation and ffi. unsafeDupablePerformIO is used when possible as the computation is pure and the output is directly linked to the input. we also do not modify anything after it has been returned to the user. BSD-style#Vincent Hanquez <vincent@snarc.org>stablegoodNoneK8 (Class of types that can be byte-swapped.e.g. Word16, Word32, Word64Big Endian valueLittle Endian value represent the CPU endiannessBig endian system stores bytes with the MSB as the first byte. Little endian system stores bytes with the LSB as the first byte.#middle endian is purposely avoided.Return the system endianness.Convert a value in cpu endianess to big endian5Convert from a big endian value to the cpu endianness1Convert a value in cpu endianess to little endian8Convert from a little endian value to the cpu endianness      BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalgoodNone1!^Siphash tag value  SigHash Key;produce a siphash with a key and a memory pointer + length.same as U, except also specifies the number of sipround iterations for compression and digest. siphash C siphash Dkey for the hashmemory pointerlength of the data ! ! BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalunknownNoneDQV+a")Transform a raw memory to an hexadecimal user beware, no checks are made#'Transform a number of bytes pointed by.0src in the hexadecimal binary representation in dst\destination memory need to be of correct size, otherwise it will lead to really bad things.Convert a value Word to two Word9s containing the hexadecimal representation of the Word#$convert a base16 src in dst.n need to even"a with1 type of function to hold reference to the objectlength in bytes#destination memory source memorynumber of bytes"#$"#$ BSD-style#Vincent Hanquez <vincent@snarc.org>stableCompatNoneD5$byteswap Word# to or from Big Endian0on a big endian machine, this function is a nop.'byteswap Word# to or from Little Endian3on a little endian machine, this function is a nop.VSimple compatibility for byteswap the lower 32 bits of a Word# at the primitive levelpSimple wrapper to handle pre 7.8 and future, where most comparaison functions don't returns a boolean anymore.=Apply or or another function if 8 divides the number of bytesnumber of bytes?if it divided by 8, the argument is the number of 8 bytes words'if it doesn't, just the number of bytes BSD-style&Nicolas DI PRIMA <nicolas@di-prima.fr> experimentalunknownNoneDQV@ %'Transform a number of bytes pointed by.+src in the base32 binary representation in dst\destination memory need to be of correct size, otherwise it will lead to really bad things.&GGet the length needed for the destination buffer for a base32 decoding.9if the length is not a multiple of 8, Nothing is returned'convert from base32 in src to binary in (dst, using the number of bytes specifiedthe user should use unBase32Length to compute the correct length, or check that the length specification is proper. no check is done here.%inputoutput input len%&'%&' BSD-style#Vincent Hanquez <vincent@snarc.org>stableCompatNoneDA^ BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalunknownSafeC BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalunknownSafeD`,      !"#$% BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalgoodNoneDKJ(FNV1(a) hash (64 bit variants)*FNV1(a) hash (32 bit variants)&6compute FNV1 (32 bit variant) of a raw piece of memory'7compute FNV1a (32 bit variant) of a raw piece of memory(6compute FNV1 (64 bit variant) of a raw piece of memory)7compute FNV1a (64 bit variant) of a raw piece of memory()*+&'()()*+ BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalunknownNoneDQV],'Transform a number of bytes pointed by src$ to base64 binary representation in dst`The destination memory need to be of correct size, otherwise it will lead to really bad things.-'Transform a number of bytes pointed by src/ to, URL-safe base64 binary representation in dstJ. The result will be either padded or unpadded, depending on the boolean padded argument.`The destination memory need to be of correct size, otherwise it will lead to really bad things./GGet the length needed for the destination buffer for a base64 decoding.9if the length is not a multiple of 4, Nothing is returned09Get the length needed for the destination buffer for an  .http://tools.ietf.org/html/rfc4648#section-3.2unpadded base64 decoding.If the length of the encoded string is a multiple of 4, plus one, Nothing is returned. Any other value can be valid without padding.3convert from base64 in src to binary in dst%, using the number of bytes specifiedthe user should use unBase64Length to compute the correct length, or check that the length specification is proper. no check is done here.,-./0123,-./0321 BSD-style#Vincent Hanquez <vincent@snarc.org>stableCompatNoneD_ *(c) Vincent Hanquez 2014 BSD-styleVincent Hanquez provisionalnon-portable (requires POSIX)Noneu+Memory synchronization flags,perform asynchronous write.-perform synchronous write..invalidate cache data./Advice to put on memory.only define the posix one.0 no specific advice, the default.1BExpect page references in random order. No readahead should occur.2RExpect page references in sequential order. Page should be readahead aggressively.3IExpect access in the near future. Probably a good idea to readahead early4(Do not expect access in the near future.5Memory protection6 Mapping flag7)memory changes are shared between process8%memory changes are private to process9Map pages of memory.vIf fd is present, this memory will represent the file associated. Otherwise, the memory will be an anonymous mapping.use mmap:Unmap pages of memoryuse munmap;7give advice to the operating system about use of memorycall madvise<%lock a range of process address spacecall mlock='unlock a range of process address spacecall munlock> set protection of memory mappingcall mprotect?4memorySync synchronize memory with physical storage.EOn an anonymous mapping this function doesn't have any effect. call msync@&Return the operating system page size.call sysconf9*The address to map to if MapFixed is used.The length of the mapping1the memory protection associated with the mapping+,-./012345ABCD6789:;<=>?@+,-./012345ABCD678 BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalunknownSafeDg4Create a new temporary buffer51xor bytes from source1 and source2 to destination d = s1 xor s22s1, nor s2 are modified unless d point to s1 or s26:xor bytes from source with a specific value to destinationd = replicate (sizeof s) v E s7 Copy a set number of bytes from src to dst8Set $n number of bytes to the same value v9'Check if two piece of memory are equals:8Compare two piece of memory and returns how they compare;2A constant time equality test for 2 Memory bufferscompared to normal equality function, this function will go over all the bytes present before yielding a result even when knowing the overall result early in the processing.456789:;456789;: BSD-style#Vincent Hanquez <vincent@snarc.org>stableGoodNone FQSTV<0Class to allocate new ByteArray of specific size= allocate n& bytes and perform the given operation>7Class to Access size properties and data of a ByteArray?)Return the length in bytes of a bytearray@Allow to use using a pointerA%Copy the data of a bytearray to a ptr=Nnumber of bytes to allocate. i.e. might not match the size of the given type ba.<=>?@A<=>?@A BSD-style#Vincent Hanquez <vincent@snarc.org>stableGoodNoneIB*A simple abstraction to a piece of memory.fDo beware that garbage collection related to piece of memory could be triggered before this is used.XOnly use with the appropriate handler has been used (e.g. withForeignPtr on ForeignPtr)D>Increase the memory view while reducing the size of the windowkthis is useful as an abtraction to represent the current offset in a buffer, and the remaining bytes left.BCDBC BSD-StyleNoneuESimple ByteArray PackerFPacking result:=PackerMore: the next state of Packing with an arbitrary valuePackerFail: an error happenedFrun a sized actionGrun a sized actionEHIFGHFGEHIFGH BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalgoodNoneI8Compute the SipHash tag of a byte array for a given key.I# is equivalent to 'sipHashWith 2 4'J8Compute the SipHash tag of a byte array for a given key.2The user can choose the C and D numbers of rounds.calling I# is equivalent to 'sipHashWith 2 4'K2Compute the FNV1 32 bit hash value of a byte arrayL3Compute the FNV1a 32 bit hash value of a byte arrayM2Compute the FNV1 64 bit hash value of a byte arrayN3Compute the FNV1a 64 bit hash value of a byte arrayJc roundsd roundskey data to hash !()*+IJKLMN !IJ*+()KLMN  BSD-style*Nicolas Di Prima <nicolas@primetype.co.uk>stableGoodNone-;<=>?AFKSTVhgOBWrapper around any collection type with the size as type parameterQ/Type class to emulate exactly the behaviour of <) but with a known length at compile timeR just like R$ but with the size at the type levelS create a O from the given >- if the size is the same as the target size.Tjust like the S9 function but throw an exception if the size is invalid.UQAllocate a new bytearray of specific size, and run the initializer on this memoryVQAllocate a new bytearray of specific size, and run the initializer on this memoryW similar to allocN: but hide the allocation and initializer in a pure contextX similar to createN: but hide the allocation and initializer in a pure contextZCreate an empty byte array[%Pack a list of bytes into a bytearray\(Un-pack a bytearray into a list of bytes]%prepend a single byte to a byte array^$append a single byte to a byte array_&Create a xor of bytes between a and b.9the returns byte array is the size of the smallest input.`@return a specific byte indexed by a number from 0 in a bytearray"unsafe, no bound checking are donea7Split a bytearray at a specific length in two bytearraybTake the first n byte of a bytearraycdrop the first n byte of a bytearrayd!append one bytearray to the othereJDuplicate a bytearray into another bytearray, and run an initializer on itf Similar to e> but also provide a way to return a value from the initializerg Similiar to e5 but expect the resulting bytearray in a pure contexthFCreate a bytearray of a specific size containing a repeated byte valuei6Create a bytearray of a specific size initialized to 0j0Convert a bytearray to another type of bytearrayk6Convert a ByteArrayAccess to another type of bytearray;This function returns nothing if the size is not compatiblel6Convert a ByteArrayAccess to another type of bytearrayOPQRSTUVWXYZ[\]^_`abcdefghijklQROPPSTUVWXYZ[\]^_`abcdefghijklOJPQR BSD-style#Vincent Hanquez <vincent@snarc.org>StableGHCNone1Dv=ScrubbedBytes is a memory chunk which have the properties of:+Being scrubbed after its goes out of scope.6A Show instance that doesn't actually show any content#A Eq instance that is constant timevvK BSD-style#Vincent Hanquez <vincent@snarc.org>stableGoodNone5wQAllocate a new bytearray of specific size, and run the initializer on this memoryxQAllocate a new bytearray of specific size, and run the initializer on this memoryy similar to w: but hide the allocation and initializer in a pure contextz similar to x: but hide the allocation and initializer in a pure context{Create an empty byte array|Check if a byte array is empty}%Pack a list of bytes into a bytearray~(Un-pack a bytearray into a list of bytesPreturns the first byte, and the remaining bytearray if the bytearray is not null&Create a byte array from a single byte%prepend a single byte to a byte array$append a single byte to a byte array&Create a xor of bytes between a and b.9the returns byte array is the size of the smallest input.@return a specific byte indexed by a number from 0 in a bytearray"unsafe, no bound checking are done7Split a bytearray at a specific length in two bytearrayTake the first n byte of a bytearraydrop the first n byte of a bytearray%Split a bytearray at the point where pred becomes invalid-Concatenate bytearray into a larger bytearray!append one bytearray to the otherJDuplicate a bytearray into another bytearray, and run an initializer on it Similar to > but also provide a way to return a value from the initializer Similiar to 5 but expect the resulting bytearray in a pure contextFCreate a bytearray of a specific size containing a repeated byte value6Create a bytearray of a specific size initialized to 0!Check if two bytearray are equalsUThis is not constant time, as soon some byte differs the function will returns. use + in sensitive context where timing matters.;A constant time equality test for 2 ByteArrayAccess values._If values are of 2 different sizes, the function will abort early without comparing any bytes.compared to == , this function will go over all the bytes present before yielding a result even when knowing the overall result early in the processing.:Check if any element of a byte array satisfies a predicate9Check if all elements of a byte array satisfy a predicate0Convert a bytearray to another type of bytearraywxyz{|}~ BSD-style&Nicolas DI PRIMA <nicolas@di-prima.fr>stableGoodNoneta view on a given bytesEquality test in constant time"create a view on a given bytearrayCThis function update the offset and the size in order to guarantee: offset >= 0 size >= 0offset < lengthsize =< length - offset&create a view from the given bytearrayWcreate a view from the given byte array starting after having dropped the fist n bytesthe byte array we put a view on%the offset to start the byte array onthe size of the view byte araysize of the view byte array7the number of bytes do dropped before creating the viewLMNO  BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalportableNoneQV"Simple ByteString parser structureP?The continuation of the next buffer value, and the parsed valueQ<The continuation of the current buffer, and the error string3Simple parsing result, that represent respectively:failure: with the error message+continuation: that need for more input data9success: the remaining unparsed data and the parser value&Run a parser on an @initial byteArray.|If the Parser need more data than available, the @feeder function is automatically called and fed to the More continuation.*Run a Parser on a ByteString and return a !Get the next byte from the parser)Parse a specific byte at current positionQif the byte is different than the expected on, this parser will raise a failure./Parse a sequence of bytes from current positiongif the following bytes don't match the expected bytestring completely, the parser will raise a failure7Take a storable from the current position in the stream5Take @n bytes from the current position in the streamLTake bytes while the @predicate hold from the current position in the stream@Take the remaining bytes from the current position in the stream5Skip @n bytes from the current position in the streamLSkip bytes while the @predicate hold from the current position in the streamDSkip all the remaining bytes from the current position in the streamRS  BSD-style#Vincent Hanquez <vincent@snarc.org>stableGoodNone0STransform a bytearray at a specific offset into a Word64 tagged as BE (Big Endian)no bounds checking. unsafeVTransform a bytearray at a specific offset into a Word64 tagged as LE (Little Endian)no bounds checking. unsafe Serialize a Word64 to a  ByteArray in big endian formatmap blocks of 128 bits of a bytearray, creating a new bytestring of equivalent size where each blocks has been mapped through f"no length checking is done. unsafe~map blocks of 64 bits of a bytearray, creating a new bytestring of equivalent size where each blocks has been mapped through f"no length checking is done. unsafe  BSD-style#Vincent Hanquez <vincent@snarc.org> experimentalunknownNone  Different bases that can be usedSee  "http://tools.ietf.org/html/rfc4648RFC46489 for details. In particular, Base64 can be standard or  ,http://tools.ietf.org/html/rfc4648#section-5URL-safeD. URL-safe encoding is often used in other specifications without  .http://tools.ietf.org/html/rfc4648#section-3.2padding characters.similar to hexadecimalstandard Base64unpadded URL-safe Base64<Base64 as used in OpenBSD password encoding (such as bcrypt)GConvert a bytearray to the equivalent representation in a specific BasePTry to Convert a bytearray from the equivalent representation in a specific Base BSD-style#Vincent Hanquez <vincent@snarc.org>stableGoodNone1D Simplest Byte ArrayT BSD-style#Vincent Hanquez <vincent@snarc.org>stableGoodNoneDC,<=>?@ABCvwxyz{|}~->?@A<=vBCDwyxz}~{|  BSD-Style#Vincent Hanquez <vincent@snarc.org> experimentalunknownNone2 >Fill a given sized buffer with the result of the Packer action/Pack the given packer into the given bytestring6Put a storable from the current position in the stream8Put a Byte Array from the current position in the stream)If the ByteArray is null, then do nothing7Skip some bytes from the current position in the streamCSkip the size of a storable from the current position in the stream:Fill up from the current position in the stream to the endIt is equivalent to: #fillUpWith s == fillList (repeat s)UWill put the given storable list from the current position in the stream to the end.jThis function will fail with not enough storage if the given storable can't be written (not enough space)Example: *> pack (fillList $ [1..] :: Word8) 9 "\1\2\3\4\5\6\7\8\9" > pack (fillList $ [1..] :: Word32) 4 "\1\0\0\0" > pack (fillList $ [1..] :: Word32) 64 .. <..succesful..> > pack (fillList $ [1..] :: Word32) 1 .. <.. not enough space ..> > pack (fillList $ [1..] :: Word32) 131 .. <.. not enough space ..>/put Word8 in the current position in the streamHput Word16 in the current position in the stream /! use Host EndiannessHput Word32 in the current position in the stream /! use Host EndiannessEFGHEFGHU !""#$$%&'()*+,-./01234567899::;<=>?@AABBCDEFGHIJKLMNOPQRSTUVWXYYZ[\]^_`abcd e f g T h i j k l m n o p q r s t u v w x y z { | } ~  jklmopqrstuvwxyz{|}~  \    w        p       !"#"$%&'(o)*+,-./0123456789:;<=>?@ABCDEFGHIJtKL[M eNOP Q R  ST$memory-0.14.15-MzFKsBVSzJCCn6eRTxvYXData.Memory.ExtendedWordsData.Memory.EndianData.ByteArray.HashData.Memory.Encoding.Base16Data.Memory.Encoding.Base32Data.Memory.Encoding.Base64Data.Memory.PtrMethodsData.ByteArrayData.ByteArray.PackData.ByteArray.SizedData.ByteArray.ParseData.ByteArray.MappingData.ByteArray.EncodingData.Memory.Internal.CompatData.Memory.Hash.SipHashData.Memory.Internal.CompatPrim!Data.Memory.Internal.CompatPrim64Data.Memory.Internal.DeepSeqData.Memory.Internal.ImportsData.Memory.Hash.FNVData.Memory.Internal.ScrubberData.Memory.MemMap.PosixData.ByteArray.TypesData.ByteArray.MemViewData.ByteArray.Pack.InternalData.ByteArray.ScrubbedBytesData.ByteArray.MethodsData.ByteArray.ViewData.ByteArray.BytesWord128 $fShowWord128 $fEqWord128ByteSwapBEunBELEunLE Endianness LittleEndian BigEndiangetSystemEndiannesstoBEfromBEtoLEfromLE$fByteSwapWord64$fByteSwapWord32$fByteSwapWord16$fShowEndianness$fEqEndianness$fShowLE$fEqLE $fStorableLE$fShowBE$fEqBE $fStorableBESipHashSipKeyshowHexadecimal toHexadecimalfromHexadecimaltoBase32unBase32Length fromBase32 FnvHash64 FnvHash32toBase64 toBase64URLtoBase64OpenBSDunBase64LengthunBase64LengthUnpaddedfromBase64OpenBSDfromBase64URLUnpadded fromBase64memCreateTemporarymemXor memXorWithmemCopymemSetmemEqual memCompare memConstEqual ByteArrayallocRetByteArrayAccesslength withByteArraycopyByteArrayToPtrMemView memViewPlusPackerResult PackerMore PackerFailsipHash sipHashWithfnv1Hash fnv1aHash fnv1_64Hash fnv1a_64HashSizedByteArrayunSizedByteArray ByteArrayNsizedByteArrayunsafeSizedByteArrayalloccreateallocAndFreeze unsafeCreateinlineUnsafeCreateemptypackunpackconssnocxorindexsplitAttakedropappendcopycopyRet copyAndFreeze replicatezeroconvertfromByteArrayAccessunsafeFromByteArrayAccess$fByteArrayNnbytesBlockN$fByteArrayNnSizedByteArray$fByteArrayAccessSizedByteArray$fEqSizedByteArray$fShowSizedByteArray$fOrdSizedByteArray$fNormalFormSizedByteArray$fSemigroupSizedByteArray$fMonoidSizedByteArray ScrubbedBytesnulluncons singletonspanconcateqconstEqanyallViewviewtakeViewdropViewParser ParseFail ParseMoreParseOK parseFeedparsehasMoreanyBytebytebytes takeStorable takeWhiletakeAllskip skipWhileskipAll $fShowResult$fAlternativeParser$fMonadPlusParser $fMonadParser$fApplicativeParser$fFunctorParsertoW64BEtoW64LE fromW64BE mapAsWord128 mapAsWord64BaseBase16Base32Base64Base64URLUnpadded Base64OpenBSD convertToBaseconvertFromBase $fShowBase$fEqBaseBytesfill putStorableputBytes skipStorable fillUpWithfillListputWord8 putWord16 putWord32 unsafeDoIObaseGHC.Word byteSwap64 byteSwap32 byteSwap16 Data.Bits unsafeShiftR unsafeShiftLpopCountbyteSwaphashhashWith InternalStateGHC.BaseString convertBytebe32Primle32Primbyteswap32Prim booleanPrimeitherDivideBy8#Int64#Word64# eqWord64# neWord64# ltWord64# leWord64# gtWord64# geWord64#eqInt64#neInt64#ltInt64#leInt64#gtInt64#geInt64# quotInt64# remInt64#and64#or64#xor64#not64#uncheckedShiftL64#uncheckedShiftRL64#int64ToWord64#word64ToInt64# intToInt64# int64ToInt# wordToWord64# word64ToWord# timesWord64#w64#deepseq-1.4.3.0Control.DeepSeqNFDatarnf<$ Applicativepure<*>*>liftA2<*ghc-prim GHC.TypesWordWord8Word16Word32Word64Data.TraversableforMControl.Applicativeoptional WrappedMonad WrapMonad unwrapMonad WrappedArrow WrapArrow unwrapArrowZipList getZipList Control.ArrowfirstsecondData.Functor.ConstConstgetConst Data.FoldableforM_ Data.Functorvoid<$>liftA3liftA<**> Alternative<|>somemanyfnv1fnv1afnv1_64fnv1a_64 getScrubberMemorySyncFlagMemorySyncAsyncMemorySyncSyncMemorySyncInvalidate MemoryAdviceMemoryAdviceNormalMemoryAdviceRandomMemoryAdviceSequentialMemoryAdviceWillNeedMemoryAdviceDontNeedMemoryProtection MemoryMapFlagMemoryMapSharedMemoryMapPrivate memoryMap memoryUnmap memoryAdvise memoryLock memoryUnlock memoryProtect memorySyncsysconfPageSizeMemoryProtectionNoneMemoryProtectionReadMemoryProtectionWriteMemoryProtectionExecute actionPackeractionPackerWithRemain runPacker_ viewOffsetviewSizeunViewSuccessFailure runParser