úÎHD•3      !"#$%&'()*+,-./012None02BDLORTException thrown while running 3J. Note that other types of exceptions can also be thrown. Invocations of 4 in the  + monad causes this exception to be thrown.2 is thrown when the data being decoded is invalid.: actions are useful for building sequential deserializers.KThey are actions which read from memory and construct values from it. The 5 and 6ƒ instances make it easy to chain these together to get more complicated deserializers. This machinery keeps track of the current 7 and end-of-buffer 7.Run the  action, with a 76 to the end of the buffer where data is poked, and a 7- to the current position. The result is the 7, along with a return value. May throw a ( if the memory contains invalid values.Exception thrown while running 8L. Note that other types of exceptions could also be thrown. Invocations of 4 in the  + monad causes this exception to be thrown.as are not expected to occur in ordinary circumstances, and usually indicate a programming error.  8 actions are useful for building sequential serializers.IThey are actions which write values to bytes into memory specified by a 7 base. The 5 and 6J instances make it easy to write serializations, by keeping track of the / of the current byte. They allow you to chain   action such that subsequent  /s write into subsequent portions of the output. Run the   action, with the 75 to the buffer where data is poked, and the current ;. The result is the new offset, along with a return value. May throw a [, though this should be avoided when possible. They usually indicate a programming error."How far into the given Ptr to look Throws a T. These should be avoided when possible, they usually indicate a programming error. Throws a . Throws a ) about an attempt to read too many bytes.9 Throws a 5 about an attempt to read a negative number of bytes.^This can happen when we read invalid data -- the length tag is basically random in this case.Given a  # and its length, uses it to fill a :hThis function is unsafe because the provided length must exactly match the number of bytes used by the  . It will throw ‹ errors when the buffer is under or overshot. However, in the case of overshooting the buffer, memory corruption and segfaults may occur.;?Checks if the offset matches the expected length, and throw a  otherwise.Decodes a value from a :1, potentially throwing exceptions, and taking a 6 to run. It is an exception to not consume all input.Decodes a value from a :1, potentially throwing exceptions, and taking a 6 to run. It is an exception to not consume all input. Similar to ?, but it allows there to be more of the buffer remaining. The I of the buffer contents immediately after the decoded value is returned.Decodes a value from a :1, potentially throwing exceptions, and taking a 6 to run. It is an exception to not consume all input. Similar to , but runs in the < monad.Like  , but using 7 and length instead of a :.Like  , but using 7 and length instead of a :.A 8( implementation based on an instance of =.A 3( implementation based on an instance of = and >.A 3( implementation based on an instance of =. Use this if the type is not >.%Copy a section of memory, based on a ?h, to the output. Note that this operation is unsafe, the offset and length parameters are not checked.lAllocate a plain ForeignPtr (no finalizers), of the specified length and fill it with bytes from the input.%Copy a section of memory, based on a 7p, to the output. Note that this operation is unsafe, because the offset and length parameters are not checked. %Copy a section of memory, based on a @p, to the output. Note that this operation is unsafe, because the offset and length parameters are not checked.!TAllocate a ByteArray of the specified length and fill it with bytes from the input.AWrapper around copyByteArrayToAddr# primop.BWrapper around copyAddrToByteArray# primop.1 9; !AB"#$%&'()*+,"  !"   !'  9; !AB"#$%&'()*+,C       !"#$%&'()*+,-./012314514614718912:;<=>?@AB12C1DE1FG@HIJKL)store-core-0.2.0.2-BxHu7N4tvU0LCuqrCsaSKIData.Store.Core PeekExceptionpeekExBytesFromEnd peekExMessagePeekrunPeek PokeExceptionpokeExByteIndex pokeExMessagePokerunPokeOffset pokeException peekException tooManyBytesunsafeEncodeWith decodeWith decodeExWithdecodeExPortionWith decodeIOWithdecodeIOPortionWithdecodeIOWithFromPtrdecodeIOPortionWithFromPtr pokeStorable peekStorablepeekStorableTypokeFromForeignPtrpeekToPlainForeignPtr pokeFromPtrpokeFromByteArraypeekToByteArray$fExceptionPeekException $fMonadIOPeek$fPrimMonadPeek$fMonadFailPeek $fMonadPeek$fApplicativePeek$fExceptionPokeException $fMonadIOPoke$fMonadFailPoke $fMonadPoke$fApplicativePoke $fFunctorPoke$fEqPokeException$fShowPokeException $fFunctorPeek$fEqPeekException$fShowPeekExceptionbaseForeign.StorablepeekGHC.Basefail ApplicativeMonadGHC.PtrPtrpoke negativeBytesbytestring-0.10.8.1Data.ByteString.Internal ByteString checkOffsetghc-prim GHC.TypesIOStorableData.Typeable.InternalTypeableGHC.ForeignPtr ForeignPtrGHC.Prim ByteArray#copyByteArrayToAddrcopyAddrToByteArray