úÎPêM:      !"#$%&'()*+,-./0123456789None02BDLORT!Exception thrown while running :J. Note that other types of exceptions can also be thrown. Invocations of ; in the + monad causes this exception to be thrown.2 is thrown when the data being decoded is invalid.Holds a  peekStatePtr, which is passed in to each + action. If the package is built with the 'force-alignment' flag, this also has a hidden <? field, which is used as scratch space during unaligned reads.A result of a  action containing the current < and a return value.: actions are useful for building sequential deserializers.KThey are actions which read from memory and construct values from it. The = and >ƒ instances make it easy to chain these together to get more complicated deserializers. This machinery keeps track of the current < and end-of-buffer <. Run the  action, with a <6 to the end of the buffer where data is poked, and a <- to the current position. The result is the <, along with a return value. May throw a ( if the memory contains invalid values. Exception thrown while running ?L. Note that other types of exceptions could also be thrown. Invocations of ; in the + monad causes this exception to be thrown. as are not expected to occur in ordinary circumstances, and usually indicate a programming error.Holds a , which is passed in to each + action. If the package is built with the 'force-alignment' flag, this also has a hidden <@ field, which is used as scratch space during unaligned writes.8 actions are useful for building sequential serializers.IThey are actions which write values to bytes into memory specified by a < base. The = and >J instances make it easy to write serializations, by keeping track of the / of the current byte. They allow you to chain  action such that subsequent /s write into subsequent portions of the output.Run the  action, with the <5 to the buffer where data is poked, and the current ;. The result is the new offset, along with a return value. May throw a  [, though this should be avoided when possible. They usually indicate a programming error."How far into the given Ptr to look Throws a  T. These should be avoided when possible, they usually indicate a programming error. Throws a . Throws a ) about an attempt to read too many bytes.@ Throws a 5 about an attempt to read a negative number of bytes.^This can happen when we read invalid data -- the length tag is basically random in this case.Given a # and its length, uses it to fill a AhThis function is unsafe because the provided length must exactly match the number of bytes used by the . It will throw  ‹ errors when the buffer is under or overshot. However, in the case of overshooting the buffer, memory corruption and segfaults may occur.B?Checks if the offset matches the expected length, and throw a   otherwise.Decodes a value from a A1, potentially throwing exceptions, and taking a 6 to run. It is an exception to not consume all input.Decodes a value from a A1, potentially throwing exceptions, and taking a 6 to run. It is an exception to not consume all input. Similar to ?, but it allows there to be more of the buffer remaining. The I of the buffer contents immediately after the decoded value is returned.Decodes a value from a A1, potentially throwing exceptions, and taking a 6 to run. It is an exception to not consume all input. Similar to , but runs in the C monad.Like  , but using < and length instead of a A.Like  , but using < and length instead of a A. A ?( implementation based on an instance of D.!A :( implementation based on an instance of D and E."A :( implementation based on an instance of D. Use this if the type is not E.#%Copy a section of memory, based on a Fh, to the output. Note that this operation is unsafe, the offset and length parameters are not checked.$lAllocate a plain ForeignPtr (no finalizers), of the specified length and fill it with bytes from the input.%%Copy a section of memory, based on a <p, to the output. Note that this operation is unsafe, because the offset and length parameters are not checked.&%Copy a section of memory, based on a Gp, to the output. Note that this operation is unsafe, because the offset and length parameters are not checked.'TAllocate a ByteArray of the specified length and fill it with bytes from the input.HWrapper around copyByteArrayToAddr# primop.IWrapper around copyAddrToByteArray# primop.9J K@B !"#$%&'HI()*+,-./012(  !"#$%&'*   !"#$%&'*J  K@B !"#$%&'HI()*+,-./012L       !"#$%&'()*+,-./01234567897:;7<=7:>7:?78@ABCDEFGH78I7JK7LMFNOPQ R%store-core-0.4-8V6LlTgkKeEEX1ovGURHpcData.Store.Core PeekExceptionpeekExBytesFromEnd peekExMessage PeekStatepeekStateEndPtr PeekResultPeekrunPeek PokeExceptionpokeExByteIndex pokeExMessage PokeState pokeStatePtrPokerunPokeOffset pokeException peekException tooManyBytesunsafeEncodeWith decodeWith decodeExWithdecodeExPortionWith decodeIOWithdecodeIOPortionWithdecodeIOWithFromPtrdecodeIOPortionWithFromPtr pokeStorable peekStorablepeekStorableTypokeFromForeignPtrpeekToPlainForeignPtr pokeFromPtrpokeFromByteArraypeekToByteArray$fExceptionPeekException $fMonadIOPeek$fPrimMonadPeek$fMonadFailPeek $fMonadPeek$fApplicativePeek$fExceptionPokeException $fMonadIOPoke$fMonadFailPoke $fMonadPoke$fApplicativePoke $fFunctorPoke$fEqPokeException$fShowPokeException$fFunctorPeekResult $fFunctorPeek$fEqPeekException$fShowPeekExceptionbaseForeign.StorablepeekGHC.BasefailGHC.PtrPtr ApplicativeMonadpoke negativeBytesbytestring-0.10.8.1Data.ByteString.Internal ByteString checkOffsetghc-prim GHC.TypesIOStorableData.Typeable.InternalTypeableGHC.ForeignPtr ForeignPtrGHC.Prim ByteArray#copyByteArrayToAddrcopyAddrToByteArray