@php-wasm/node-7-4 3.1.2 → 3.1.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -15,7 +15,7 @@ const currentDirPath =
15
15
  : path.dirname(fileURLToPath(import.meta.url));
16
16
  const dependencyFilename = path.join(currentDirPath, '7_4_33', 'php_7_4.wasm');
17
17
  export { dependencyFilename };
18
- export const dependenciesTotalSize = 22934461;
18
+ export const dependenciesTotalSize = 22948201;
19
19
  const phpVersionString = '7.4.33';
20
20
  export function init(RuntimeName, PHPLoader) {
21
21
  // The rest of the code comes from the built php.js file and esm-suffix.js
@@ -5125,8 +5125,10 @@ export function init(RuntimeName, PHPLoader) {
5125
5125
  );
5126
5126
 
5127
5127
  var ___call_sighandler = (fp, sig) =>
5128
- ((a1) => {})(
5129
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
5128
+ ((
5129
+ a1
5130
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
5131
+ sig
5130
5132
  );
5131
5133
  ___call_sighandler.sig = 'vpi';
5132
5134
 
@@ -6539,6 +6541,9 @@ export function init(RuntimeName, PHPLoader) {
6539
6541
 
6540
6542
  var allocateUTF8OnStack = (...args) => stringToUTF8OnStack(...args);
6541
6543
 
6544
+ var onInits = [];
6545
+ var addOnInit = (cb) => onInits.push(cb);
6546
+
6542
6547
  function _js_getpid() {
6543
6548
  return PHPLoader.processId ?? 42;
6544
6549
  }
@@ -6562,10 +6567,13 @@ export function init(RuntimeName, PHPLoader) {
6562
6567
  * are not yet assigned.
6563
6568
  */
6564
6569
  addOnInit(() => {
6570
+ if (typeof PHPLoader.processId !== 'number') {
6571
+ throw new Error(
6572
+ 'PHPLoader.processId must be set before init'
6573
+ );
6574
+ }
6565
6575
  Module['userSpace'] = PHPLoader.bindUserSpace({
6566
- // TODO: Require PID instead of defaulting to 42.
6567
- pid: PHPLoader.processId ?? 42,
6568
- // TODO: When receiving this context, validate that all these fields exist.
6576
+ pid: PHPLoader.processId,
6569
6577
  constants: {
6570
6578
  F_GETFL: Number('3'),
6571
6579
  O_ACCMODE: Number('2097155'),
@@ -6606,19 +6614,107 @@ export function init(RuntimeName, PHPLoader) {
6606
6614
  LOCK_UN: 8, // Unlock
6607
6615
  },
6608
6616
  errnoCodes: ERRNO_CODES,
6617
+ // Use get/set closures instead of exposing
6618
+ // typed arrays directly. After memory.grow(),
6619
+ // Emscripten's updateMemoryViews() reassigns
6620
+ // the module-scoped HEAP* variables. Closures
6621
+ // always reference the current value, so
6622
+ // accesses are never stale. The get/set
6623
+ // interface also prevents callers from
6624
+ // capturing a typed array reference that
6625
+ // could become stale.
6609
6626
  memory: {
6610
- HEAP8,
6611
- HEAPU8,
6612
- HEAP16,
6613
- HEAPU16,
6614
- HEAP32,
6615
- HEAPU32,
6616
- HEAPF32,
6617
- HEAP64,
6618
- HEAPU64,
6619
- HEAPF64,
6627
+ HEAP8: {
6628
+ get(offset) {
6629
+ return HEAP8[offset];
6630
+ },
6631
+ set(offset, value) {
6632
+ HEAP8[offset] = value;
6633
+ },
6634
+ },
6635
+ HEAPU8: {
6636
+ get(offset) {
6637
+ return HEAPU8[offset];
6638
+ },
6639
+ set(offset, value) {
6640
+ HEAPU8[offset] = value;
6641
+ },
6642
+ },
6643
+ HEAP16: {
6644
+ get(offset) {
6645
+ return HEAP16[offset];
6646
+ },
6647
+ set(offset, value) {
6648
+ HEAP16[offset] = value;
6649
+ },
6650
+ },
6651
+ HEAPU16: {
6652
+ get(offset) {
6653
+ return HEAPU16[offset];
6654
+ },
6655
+ set(offset, value) {
6656
+ HEAPU16[offset] = value;
6657
+ },
6658
+ },
6659
+ HEAP32: {
6660
+ get(offset) {
6661
+ return HEAP32[offset];
6662
+ },
6663
+ set(offset, value) {
6664
+ HEAP32[offset] = value;
6665
+ },
6666
+ },
6667
+ HEAPU32: {
6668
+ get(offset) {
6669
+ return HEAPU32[offset];
6670
+ },
6671
+ set(offset, value) {
6672
+ HEAPU32[offset] = value;
6673
+ },
6674
+ },
6675
+ HEAPF32: {
6676
+ get(offset) {
6677
+ return HEAPF32[offset];
6678
+ },
6679
+ set(offset, value) {
6680
+ HEAPF32[offset] = value;
6681
+ },
6682
+ },
6683
+ HEAP64: {
6684
+ get(offset) {
6685
+ return HEAP64[offset];
6686
+ },
6687
+ set(offset, value) {
6688
+ HEAP64[offset] = value;
6689
+ },
6690
+ },
6691
+ HEAPU64: {
6692
+ get(offset) {
6693
+ return HEAPU64[offset];
6694
+ },
6695
+ set(offset, value) {
6696
+ HEAPU64[offset] = value;
6697
+ },
6698
+ },
6699
+ HEAPF64: {
6700
+ get(offset) {
6701
+ return HEAPF64[offset];
6702
+ },
6703
+ set(offset, value) {
6704
+ HEAPF64[offset] = value;
6705
+ },
6706
+ },
6620
6707
  },
6621
- wasmImports,
6708
+ wasmImports: Object.assign(
6709
+ {},
6710
+ wasmImports,
6711
+ typeof _builtin_fd_close === 'function'
6712
+ ? { builtin_fd_close: _builtin_fd_close }
6713
+ : {},
6714
+ typeof _builtin_fcntl64 === 'function'
6715
+ ? { builtin_fcntl64: _builtin_fcntl64 }
6716
+ : {}
6717
+ ),
6622
6718
  wasmExports,
6623
6719
  syscalls: SYSCALLS,
6624
6720
  FS,
@@ -8503,8 +8599,11 @@ export function init(RuntimeName, PHPLoader) {
8503
8599
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8504
8600
  runtimeKeepalivePop();
8505
8601
  callUserCallback(() =>
8506
- ((a1, a2) => {})(
8507
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8602
+ ((
8603
+ a1,
8604
+ a2
8605
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8606
+ handle,
8508
8607
  user_data
8509
8608
  )
8510
8609
  );
@@ -8512,8 +8611,11 @@ export function init(RuntimeName, PHPLoader) {
8512
8611
  function successCallback() {
8513
8612
  runtimeKeepalivePop();
8514
8613
  callUserCallback(() =>
8515
- ((a1, a2) => {})(
8516
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8614
+ ((
8615
+ a1,
8616
+ a2
8617
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8618
+ handle,
8517
8619
  user_data
8518
8620
  )
8519
8621
  );
@@ -17033,9 +17135,9 @@ export function init(RuntimeName, PHPLoader) {
17033
17135
  if (!cp.stdin.closed) {
17034
17136
  cp.stdin.end();
17035
17137
  }
17036
- _free(buffer);
17037
- _free(iov);
17038
- _free(pnum);
17138
+ _wasm_free(buffer);
17139
+ _wasm_free(iov);
17140
+ _wasm_free(pnum);
17039
17141
  }
17040
17142
 
17041
17143
  // pump() can never alter the result of this function.
@@ -17758,7 +17860,17 @@ export function init(RuntimeName, PHPLoader) {
17758
17860
  // A true async operation was begun; start a sleep.
17759
17861
  Asyncify.state = Asyncify.State.Unwinding;
17760
17862
  // TODO: reuse, don't alloc/free every sleep
17761
- Asyncify.currData = Asyncify.allocateData();
17863
+ if (!Asyncify._cachedData) {
17864
+ Asyncify._cachedData = Asyncify.allocateData();
17865
+ } else {
17866
+ Asyncify.setDataHeader(
17867
+ Asyncify._cachedData,
17868
+ Asyncify._cachedData + 12,
17869
+ Asyncify.StackSize
17870
+ );
17871
+ Asyncify.setDataRewindFunc(Asyncify._cachedData);
17872
+ }
17873
+ Asyncify.currData = Asyncify._cachedData;
17762
17874
  if (typeof MainLoop != 'undefined' && MainLoop.func) {
17763
17875
  MainLoop.pause();
17764
17876
  }
@@ -17770,7 +17882,6 @@ export function init(RuntimeName, PHPLoader) {
17770
17882
  // Stop a resume.
17771
17883
  Asyncify.state = Asyncify.State.Normal;
17772
17884
  runAndAbortIfError(_asyncify_stop_rewind);
17773
- _free(Asyncify.currData);
17774
17885
  Asyncify.currData = null;
17775
17886
  // Call all sleep callbacks now that the sleep-resume is all done.
17776
17887
  Asyncify.sleepCallbacks.forEach(callUserCallback);
@@ -18099,8 +18210,11 @@ export function init(RuntimeName, PHPLoader) {
18099
18210
  var trace = getCallstack();
18100
18211
  var parts = trace.split('\n');
18101
18212
  for (var i = 0; i < parts.length; i++) {
18102
- var ret = ((a1, a2) => {})(
18103
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
18213
+ var ret = ((
18214
+ a1,
18215
+ a2
18216
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18217
+ 0,
18104
18218
  arg
18105
18219
  );
18106
18220
  if (ret !== 0) return;
@@ -18204,10 +18318,6 @@ export function init(RuntimeName, PHPLoader) {
18204
18318
  };
18205
18319
  __emscripten_fs_load_embedded_files.sig = 'vp';
18206
18320
 
18207
- var onInits = [];
18208
-
18209
- var addOnInit = (cb) => onInits.push(cb);
18210
-
18211
18321
  var onMains = [];
18212
18322
 
18213
18323
  var addOnPreMain = (cb) => onMains.push(cb);
@@ -18644,8 +18754,12 @@ export function init(RuntimeName, PHPLoader) {
18644
18754
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
18645
18755
 
18646
18756
  if (
18647
- ((a1, a2, a3) => {})(
18648
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
18757
+ ((
18758
+ a1,
18759
+ a2,
18760
+ a3
18761
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18762
+ eventTypeId,
18649
18763
  keyEventData,
18650
18764
  userData
18651
18765
  )
@@ -18763,8 +18877,12 @@ export function init(RuntimeName, PHPLoader) {
18763
18877
  fillMouseEventData(JSEvents.mouseEvent, e, target);
18764
18878
 
18765
18879
  if (
18766
- ((a1, a2, a3) => {})(
18767
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
18880
+ ((
18881
+ a1,
18882
+ a2,
18883
+ a3
18884
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18885
+ eventTypeId,
18768
18886
  JSEvents.mouseEvent,
18769
18887
  userData
18770
18888
  )
@@ -18978,8 +19096,12 @@ export function init(RuntimeName, PHPLoader) {
18978
19096
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
18979
19097
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
18980
19098
  if (
18981
- ((a1, a2, a3) => {})(
18982
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19099
+ ((
19100
+ a1,
19101
+ a2,
19102
+ a3
19103
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19104
+ eventTypeId,
18983
19105
  wheelEvent,
18984
19106
  userData
18985
19107
  )
@@ -19060,8 +19182,12 @@ export function init(RuntimeName, PHPLoader) {
19060
19182
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
19061
19183
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
19062
19184
  if (
19063
- ((a1, a2, a3) => {})(
19064
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19185
+ ((
19186
+ a1,
19187
+ a2,
19188
+ a3
19189
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19190
+ eventTypeId,
19065
19191
  uiEvent,
19066
19192
  userData
19067
19193
  )
@@ -19135,8 +19261,12 @@ export function init(RuntimeName, PHPLoader) {
19135
19261
  stringToUTF8(id, focusEvent + 128, 128);
19136
19262
 
19137
19263
  if (
19138
- ((a1, a2, a3) => {})(
19139
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19264
+ ((
19265
+ a1,
19266
+ a2,
19267
+ a3
19268
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19269
+ eventTypeId,
19140
19270
  focusEvent,
19141
19271
  userData
19142
19272
  )
@@ -19252,8 +19382,12 @@ export function init(RuntimeName, PHPLoader) {
19252
19382
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
19253
19383
 
19254
19384
  if (
19255
- ((a1, a2, a3) => {})(
19256
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19385
+ ((
19386
+ a1,
19387
+ a2,
19388
+ a3
19389
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19390
+ eventTypeId,
19257
19391
  JSEvents.deviceOrientationEvent,
19258
19392
  userData
19259
19393
  )
@@ -19337,8 +19471,12 @@ export function init(RuntimeName, PHPLoader) {
19337
19471
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
19338
19472
 
19339
19473
  if (
19340
- ((a1, a2, a3) => {})(
19341
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19474
+ ((
19475
+ a1,
19476
+ a2,
19477
+ a3
19478
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19479
+ eventTypeId,
19342
19480
  JSEvents.deviceMotionEvent,
19343
19481
  userData
19344
19482
  )
@@ -19445,8 +19583,12 @@ export function init(RuntimeName, PHPLoader) {
19445
19583
  fillOrientationChangeEventData(orientationChangeEvent);
19446
19584
 
19447
19585
  if (
19448
- ((a1, a2, a3) => {})(
19449
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19586
+ ((
19587
+ a1,
19588
+ a2,
19589
+ a3
19590
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19591
+ eventTypeId,
19450
19592
  orientationChangeEvent,
19451
19593
  userData
19452
19594
  )
@@ -19575,8 +19717,12 @@ export function init(RuntimeName, PHPLoader) {
19575
19717
  fillFullscreenChangeEventData(fullscreenChangeEvent);
19576
19718
 
19577
19719
  if (
19578
- ((a1, a2, a3) => {})(
19579
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19720
+ ((
19721
+ a1,
19722
+ a2,
19723
+ a3
19724
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19725
+ eventTypeId,
19580
19726
  fullscreenChangeEvent,
19581
19727
  userData
19582
19728
  )
@@ -19721,8 +19867,12 @@ export function init(RuntimeName, PHPLoader) {
19721
19867
  );
19722
19868
 
19723
19869
  if (currentFullscreenStrategy.canvasResizedCallback) {
19724
- ((a1, a2, a3) => {})(
19725
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
19870
+ ((
19871
+ a1,
19872
+ a2,
19873
+ a3
19874
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19875
+ 37,
19726
19876
  0,
19727
19877
  currentFullscreenStrategy.canvasResizedCallbackUserData
19728
19878
  );
@@ -19823,8 +19973,12 @@ export function init(RuntimeName, PHPLoader) {
19823
19973
  currentFullscreenStrategy = strategy;
19824
19974
 
19825
19975
  if (strategy.canvasResizedCallback) {
19826
- ((a1, a2, a3) => {})(
19827
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
19976
+ ((
19977
+ a1,
19978
+ a2,
19979
+ a3
19980
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19981
+ 37,
19828
19982
  0,
19829
19983
  strategy.canvasResizedCallbackUserData
19830
19984
  );
@@ -19924,8 +20078,12 @@ export function init(RuntimeName, PHPLoader) {
19924
20078
  !inCenteredWithoutScalingFullscreenMode &&
19925
20079
  currentFullscreenStrategy.canvasResizedCallback
19926
20080
  ) {
19927
- ((a1, a2, a3) => {})(
19928
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20081
+ ((
20082
+ a1,
20083
+ a2,
20084
+ a3
20085
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20086
+ 37,
19929
20087
  0,
19930
20088
  currentFullscreenStrategy.canvasResizedCallbackUserData
19931
20089
  );
@@ -20024,8 +20182,12 @@ export function init(RuntimeName, PHPLoader) {
20024
20182
  softFullscreenResizeWebGLRenderTarget
20025
20183
  );
20026
20184
  if (strategy.canvasResizedCallback) {
20027
- ((a1, a2, a3) => {})(
20028
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20185
+ ((
20186
+ a1,
20187
+ a2,
20188
+ a3
20189
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20190
+ 37,
20029
20191
  0,
20030
20192
  strategy.canvasResizedCallbackUserData
20031
20193
  );
@@ -20038,8 +20200,12 @@ export function init(RuntimeName, PHPLoader) {
20038
20200
 
20039
20201
  // Inform the caller that the canvas size has changed.
20040
20202
  if (strategy.canvasResizedCallback) {
20041
- ((a1, a2, a3) => {})(
20042
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20203
+ ((
20204
+ a1,
20205
+ a2,
20206
+ a3
20207
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20208
+ 37,
20043
20209
  0,
20044
20210
  strategy.canvasResizedCallbackUserData
20045
20211
  );
@@ -20101,8 +20267,12 @@ export function init(RuntimeName, PHPLoader) {
20101
20267
  fillPointerlockChangeEventData(pointerlockChangeEvent);
20102
20268
 
20103
20269
  if (
20104
- ((a1, a2, a3) => {})(
20105
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20270
+ ((
20271
+ a1,
20272
+ a2,
20273
+ a3
20274
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20275
+ eventTypeId,
20106
20276
  pointerlockChangeEvent,
20107
20277
  userData
20108
20278
  )
@@ -20156,8 +20326,12 @@ export function init(RuntimeName, PHPLoader) {
20156
20326
  ) => {
20157
20327
  var pointerlockErrorEventHandlerFunc = (e = event) => {
20158
20328
  if (
20159
- ((a1, a2, a3) => {})(
20160
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20329
+ ((
20330
+ a1,
20331
+ a2,
20332
+ a3
20333
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20334
+ eventTypeId,
20161
20335
  0,
20162
20336
  userData
20163
20337
  )
@@ -20311,8 +20485,12 @@ export function init(RuntimeName, PHPLoader) {
20311
20485
  fillVisibilityChangeEventData(visibilityChangeEvent);
20312
20486
 
20313
20487
  if (
20314
- ((a1, a2, a3) => {})(
20315
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20488
+ ((
20489
+ a1,
20490
+ a2,
20491
+ a3
20492
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20493
+ eventTypeId,
20316
20494
  visibilityChangeEvent,
20317
20495
  userData
20318
20496
  )
@@ -20432,8 +20610,12 @@ export function init(RuntimeName, PHPLoader) {
20432
20610
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
20433
20611
 
20434
20612
  if (
20435
- ((a1, a2, a3) => {})(
20436
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20613
+ ((
20614
+ a1,
20615
+ a2,
20616
+ a3
20617
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20618
+ eventTypeId,
20437
20619
  touchEvent,
20438
20620
  userData
20439
20621
  )
@@ -20571,8 +20753,12 @@ export function init(RuntimeName, PHPLoader) {
20571
20753
  fillGamepadEventData(gamepadEvent, e['gamepad']);
20572
20754
 
20573
20755
  if (
20574
- ((a1, a2, a3) => {})(
20575
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20756
+ ((
20757
+ a1,
20758
+ a2,
20759
+ a3
20760
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20761
+ eventTypeId,
20576
20762
  gamepadEvent,
20577
20763
  userData
20578
20764
  )
@@ -20674,8 +20860,12 @@ export function init(RuntimeName, PHPLoader) {
20674
20860
  ) => {
20675
20861
  var beforeUnloadEventHandlerFunc = (e = event) => {
20676
20862
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
20677
- var confirmationMessage = ((a1, a2, a3) => {})(
20678
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20863
+ var confirmationMessage = ((
20864
+ a1,
20865
+ a2,
20866
+ a3
20867
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20868
+ eventTypeId,
20679
20869
  0,
20680
20870
  userData
20681
20871
  );
@@ -20746,8 +20936,12 @@ export function init(RuntimeName, PHPLoader) {
20746
20936
  fillBatteryEventData(batteryEvent, battery);
20747
20937
 
20748
20938
  if (
20749
- ((a1, a2, a3) => {})(
20750
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20939
+ ((
20940
+ a1,
20941
+ a2,
20942
+ a3
20943
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20944
+ eventTypeId,
20751
20945
  batteryEvent,
20752
20946
  userData
20753
20947
  )
@@ -20849,8 +21043,11 @@ export function init(RuntimeName, PHPLoader) {
20849
21043
 
20850
21044
  var _emscripten_request_animation_frame = (cb, userData) =>
20851
21045
  requestAnimationFrame((timeStamp) =>
20852
- ((a1, a2) => {})(
20853
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21046
+ ((
21047
+ a1,
21048
+ a2
21049
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21050
+ timeStamp,
20854
21051
  userData
20855
21052
  )
20856
21053
  );
@@ -20862,8 +21059,11 @@ export function init(RuntimeName, PHPLoader) {
20862
21059
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
20863
21060
  function tick(timeStamp) {
20864
21061
  if (
20865
- ((a1, a2) => {})(
20866
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21062
+ ((
21063
+ a1,
21064
+ a2
21065
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21066
+ timeStamp,
20867
21067
  userData
20868
21068
  )
20869
21069
  ) {
@@ -21120,8 +21320,10 @@ export function init(RuntimeName, PHPLoader) {
21120
21320
  return emSetImmediate(() => {
21121
21321
  runtimeKeepalivePop();
21122
21322
  callUserCallback(() =>
21123
- ((a1) => {})(
21124
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21323
+ ((
21324
+ a1
21325
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21326
+ userData
21125
21327
  )
21126
21328
  );
21127
21329
  });
@@ -21138,8 +21340,10 @@ export function init(RuntimeName, PHPLoader) {
21138
21340
  function tick() {
21139
21341
  callUserCallback(() => {
21140
21342
  if (
21141
- ((a1) => {})(
21142
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21343
+ ((
21344
+ a1
21345
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21346
+ userData
21143
21347
  )
21144
21348
  ) {
21145
21349
  emSetImmediate(tick);
@@ -21156,8 +21360,10 @@ export function init(RuntimeName, PHPLoader) {
21156
21360
  var _emscripten_set_timeout = (cb, msecs, userData) =>
21157
21361
  safeSetTimeout(
21158
21362
  () =>
21159
- ((a1) => {})(
21160
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21363
+ ((
21364
+ a1
21365
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21366
+ userData
21161
21367
  ),
21162
21368
  msecs
21163
21369
  );
@@ -21173,8 +21379,11 @@ export function init(RuntimeName, PHPLoader) {
21173
21379
  runtimeKeepalivePop();
21174
21380
  callUserCallback(() => {
21175
21381
  if (
21176
- ((a1, a2) => {})(
21177
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
21382
+ ((
21383
+ a1,
21384
+ a2
21385
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21386
+ t,
21178
21387
  userData
21179
21388
  )
21180
21389
  ) {
@@ -21198,8 +21407,10 @@ export function init(RuntimeName, PHPLoader) {
21198
21407
  runtimeKeepalivePush();
21199
21408
  return setInterval(() => {
21200
21409
  callUserCallback(() =>
21201
- ((a1) => {})(
21202
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21410
+ ((
21411
+ a1
21412
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21413
+ userData
21203
21414
  )
21204
21415
  );
21205
21416
  }, msecs);
@@ -21214,8 +21425,10 @@ export function init(RuntimeName, PHPLoader) {
21214
21425
 
21215
21426
  var _emscripten_async_call = (func, arg, millis) => {
21216
21427
  var wrapper = () =>
21217
- ((a1) => {})(
21218
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21428
+ ((
21429
+ a1
21430
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21431
+ arg
21219
21432
  );
21220
21433
 
21221
21434
  if (
@@ -21248,7 +21461,7 @@ export function init(RuntimeName, PHPLoader) {
21248
21461
 
21249
21462
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
21250
21463
  var iterFunc =
21251
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
21464
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
21252
21465
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
21253
21466
  };
21254
21467
  _emscripten_set_main_loop.sig = 'vpii';
@@ -21260,8 +21473,10 @@ export function init(RuntimeName, PHPLoader) {
21260
21473
  simulateInfiniteLoop
21261
21474
  ) => {
21262
21475
  var iterFunc = () =>
21263
- ((a1) => {})(
21264
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21476
+ ((
21477
+ a1
21478
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21479
+ arg
21265
21480
  );
21266
21481
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
21267
21482
  };
@@ -21282,8 +21497,10 @@ export function init(RuntimeName, PHPLoader) {
21282
21497
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
21283
21498
  MainLoop.queue.push({
21284
21499
  func: () => {
21285
- ((a1) => {})(
21286
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21500
+ ((
21501
+ a1
21502
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21503
+ arg
21287
21504
  );
21288
21505
  },
21289
21506
  name: UTF8ToString(name),
@@ -21296,8 +21513,10 @@ export function init(RuntimeName, PHPLoader) {
21296
21513
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
21297
21514
  MainLoop.queue.push({
21298
21515
  func: () => {
21299
- ((a1) => {})(
21300
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21516
+ ((
21517
+ a1
21518
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21519
+ arg
21301
21520
  );
21302
21521
  },
21303
21522
  name: UTF8ToString(name),
@@ -21331,8 +21550,12 @@ export function init(RuntimeName, PHPLoader) {
21331
21550
  var resultPtr = stackAlloc(POINTER_SIZE);
21332
21551
  HEAPU32[resultPtr >> 2] = 0;
21333
21552
  try {
21334
- var result = ((a1, a2, a3) => {})(
21335
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
21553
+ var result = ((
21554
+ a1,
21555
+ a2,
21556
+ a3
21557
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21558
+ resultPtr,
21336
21559
  userData,
21337
21560
  value
21338
21561
  );
@@ -22169,15 +22392,19 @@ export function init(RuntimeName, PHPLoader) {
22169
22392
  () => {
22170
22393
  runtimeKeepalivePop();
22171
22394
  if (onload)
22172
- ((a1) => {})(
22173
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22395
+ ((
22396
+ a1
22397
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22398
+ file
22174
22399
  );
22175
22400
  },
22176
22401
  () => {
22177
22402
  runtimeKeepalivePop();
22178
22403
  if (onerror)
22179
- ((a1) => {})(
22180
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22404
+ ((
22405
+ a1
22406
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22407
+ file
22181
22408
  );
22182
22409
  },
22183
22410
  true // don'tCreateFile - it's already there
@@ -22211,16 +22438,21 @@ export function init(RuntimeName, PHPLoader) {
22211
22438
  () => {
22212
22439
  runtimeKeepalivePop();
22213
22440
  if (onload)
22214
- ((a1, a2) => {})(
22215
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
22441
+ ((
22442
+ a1,
22443
+ a2
22444
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22445
+ arg,
22216
22446
  cname
22217
22447
  );
22218
22448
  },
22219
22449
  () => {
22220
22450
  runtimeKeepalivePop();
22221
22451
  if (onerror)
22222
- ((a1) => {})(
22223
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22452
+ ((
22453
+ a1
22454
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22455
+ arg
22224
22456
  );
22225
22457
  },
22226
22458
  true // don'tCreateFile - it's already there
@@ -22488,10 +22720,10 @@ export function init(RuntimeName, PHPLoader) {
22488
22720
  runtimeKeepalivePop();
22489
22721
  callUserCallback(() =>
22490
22722
  withStackSave(() =>
22491
- ((a1) => {})(
22492
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
22493
- _file
22494
- )
22723
+ ((
22724
+ a1
22725
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22726
+ stringToUTF8OnStack(_file)
22495
22727
  )
22496
22728
  )
22497
22729
  );
@@ -22535,8 +22767,12 @@ export function init(RuntimeName, PHPLoader) {
22535
22767
  callUserCallback(() => {
22536
22768
  var buffer = _malloc(byteArray.length);
22537
22769
  HEAPU8.set(byteArray, buffer);
22538
- ((a1, a2, a3) => {})(
22539
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
22770
+ ((
22771
+ a1,
22772
+ a2,
22773
+ a3
22774
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22775
+ userdata,
22540
22776
  buffer,
22541
22777
  byteArray.length
22542
22778
  );
@@ -22546,8 +22782,10 @@ export function init(RuntimeName, PHPLoader) {
22546
22782
  if (onerror) {
22547
22783
  runtimeKeepalivePop();
22548
22784
  callUserCallback(() => {
22549
- ((a1) => {})(
22550
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
22785
+ ((
22786
+ a1
22787
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22788
+ userdata
22551
22789
  );
22552
22790
  });
22553
22791
  }
@@ -22603,8 +22841,12 @@ export function init(RuntimeName, PHPLoader) {
22603
22841
  );
22604
22842
  if (onload) {
22605
22843
  var sp = stackSave();
22606
- ((a1, a2, a3) => {})(
22607
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22844
+ ((
22845
+ a1,
22846
+ a2,
22847
+ a3
22848
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22849
+ handle,
22608
22850
  userdata,
22609
22851
  stringToUTF8OnStack(_file)
22610
22852
  );
@@ -22612,8 +22854,12 @@ export function init(RuntimeName, PHPLoader) {
22612
22854
  }
22613
22855
  } else {
22614
22856
  if (onerror)
22615
- ((a1, a2, a3) => {})(
22616
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22857
+ ((
22858
+ a1,
22859
+ a2,
22860
+ a3
22861
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22862
+ handle,
22617
22863
  userdata,
22618
22864
  http.status
22619
22865
  );
@@ -22626,8 +22872,12 @@ export function init(RuntimeName, PHPLoader) {
22626
22872
  http.onerror = (e) => {
22627
22873
  runtimeKeepalivePop();
22628
22874
  if (onerror)
22629
- ((a1, a2, a3) => {})(
22630
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22875
+ ((
22876
+ a1,
22877
+ a2,
22878
+ a3
22879
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22880
+ handle,
22631
22881
  userdata,
22632
22882
  http.status
22633
22883
  );
@@ -22642,8 +22892,12 @@ export function init(RuntimeName, PHPLoader) {
22642
22892
  ) {
22643
22893
  var percentComplete = (e.loaded / e.total) * 100;
22644
22894
  if (onprogress)
22645
- ((a1, a2, a3) => {})(
22646
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22895
+ ((
22896
+ a1,
22897
+ a2,
22898
+ a3
22899
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22900
+ handle,
22647
22901
  userdata,
22648
22902
  percentComplete
22649
22903
  );
@@ -22700,8 +22954,13 @@ export function init(RuntimeName, PHPLoader) {
22700
22954
  if (http.statusText) {
22701
22955
  statusText = stringToUTF8OnStack(http.statusText);
22702
22956
  }
22703
- ((a1, a2, a3, a4) => {})(
22704
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22957
+ ((
22958
+ a1,
22959
+ a2,
22960
+ a3,
22961
+ a4
22962
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22963
+ handle,
22705
22964
  userdata,
22706
22965
  http.status,
22707
22966
  statusText
@@ -22722,8 +22981,13 @@ export function init(RuntimeName, PHPLoader) {
22722
22981
  var buffer = _malloc(byteArray.length);
22723
22982
  HEAPU8.set(byteArray, buffer);
22724
22983
  if (onload)
22725
- ((a1, a2, a3, a4) => {})(
22726
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22984
+ ((
22985
+ a1,
22986
+ a2,
22987
+ a3,
22988
+ a4
22989
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22990
+ handle,
22727
22991
  userdata,
22728
22992
  buffer,
22729
22993
  byteArray.length
@@ -22744,8 +23008,13 @@ export function init(RuntimeName, PHPLoader) {
22744
23008
  // PROGRESS
22745
23009
  http.onprogress = (e) => {
22746
23010
  if (onprogress)
22747
- ((a1, a2, a3, a4) => {})(
22748
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23011
+ ((
23012
+ a1,
23013
+ a2,
23014
+ a3,
23015
+ a4
23016
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23017
+ handle,
22749
23018
  userdata,
22750
23019
  e.loaded,
22751
23020
  e.lengthComputable || e.lengthComputable === undefined
@@ -23076,16 +23345,24 @@ export function init(RuntimeName, PHPLoader) {
23076
23345
  if (event === 'error') {
23077
23346
  withStackSave(() => {
23078
23347
  var msg = stringToUTF8OnStack(data[2]);
23079
- ((a1, a2, a3, a4) => {})(
23080
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
23348
+ ((
23349
+ a1,
23350
+ a2,
23351
+ a3,
23352
+ a4
23353
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23354
+ data[0],
23081
23355
  data[1],
23082
23356
  msg,
23083
23357
  userData
23084
23358
  );
23085
23359
  });
23086
23360
  } else {
23087
- ((a1, a2) => {})(
23088
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
23361
+ ((
23362
+ a1,
23363
+ a2
23364
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23365
+ data,
23089
23366
  userData
23090
23367
  );
23091
23368
  }
@@ -24038,8 +24315,12 @@ export function init(RuntimeName, PHPLoader) {
24038
24315
  ) => {
24039
24316
  var webGlEventHandlerFunc = (e = event) => {
24040
24317
  if (
24041
- ((a1, a2, a3) => {})(
24042
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
24318
+ ((
24319
+ a1,
24320
+ a2,
24321
+ a3
24322
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24323
+ eventTypeId,
24043
24324
  0,
24044
24325
  userData
24045
24326
  )
@@ -24258,15 +24539,21 @@ export function init(RuntimeName, PHPLoader) {
24258
24539
  ) {
24259
24540
  event.preventDefault();
24260
24541
  GLUT.saveModifiers(event);
24261
- ((a1, a2) => {})(
24262
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
24542
+ ((
24543
+ a1,
24544
+ a2
24545
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24546
+ lastX,
24263
24547
  lastY
24264
24548
  );
24265
24549
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
24266
24550
  event.preventDefault();
24267
24551
  GLUT.saveModifiers(event);
24268
- ((a1, a2) => {})(
24269
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
24552
+ ((
24553
+ a1,
24554
+ a2
24555
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24556
+ lastX,
24270
24557
  lastY
24271
24558
  );
24272
24559
  }
@@ -24427,8 +24714,12 @@ export function init(RuntimeName, PHPLoader) {
24427
24714
  if (GLUT.specialFunc) {
24428
24715
  event.preventDefault();
24429
24716
  GLUT.saveModifiers(event);
24430
- ((a1, a2, a3) => {})(
24431
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24717
+ ((
24718
+ a1,
24719
+ a2,
24720
+ a3
24721
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24722
+ key,
24432
24723
  Browser.mouseX,
24433
24724
  Browser.mouseY
24434
24725
  );
@@ -24438,8 +24729,12 @@ export function init(RuntimeName, PHPLoader) {
24438
24729
  if (key !== null && GLUT.keyboardFunc) {
24439
24730
  event.preventDefault();
24440
24731
  GLUT.saveModifiers(event);
24441
- ((a1, a2, a3) => {})(
24442
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24732
+ ((
24733
+ a1,
24734
+ a2,
24735
+ a3
24736
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24737
+ key,
24443
24738
  Browser.mouseX,
24444
24739
  Browser.mouseY
24445
24740
  );
@@ -24454,8 +24749,12 @@ export function init(RuntimeName, PHPLoader) {
24454
24749
  if (GLUT.specialUpFunc) {
24455
24750
  event.preventDefault();
24456
24751
  GLUT.saveModifiers(event);
24457
- ((a1, a2, a3) => {})(
24458
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24752
+ ((
24753
+ a1,
24754
+ a2,
24755
+ a3
24756
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24757
+ key,
24459
24758
  Browser.mouseX,
24460
24759
  Browser.mouseY
24461
24760
  );
@@ -24465,8 +24764,12 @@ export function init(RuntimeName, PHPLoader) {
24465
24764
  if (key !== null && GLUT.keyboardUpFunc) {
24466
24765
  event.preventDefault();
24467
24766
  GLUT.saveModifiers(event);
24468
- ((a1, a2, a3) => {})(
24469
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24767
+ ((
24768
+ a1,
24769
+ a2,
24770
+ a3
24771
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24772
+ key,
24470
24773
  Browser.mouseX,
24471
24774
  Browser.mouseY
24472
24775
  );
@@ -24530,10 +24833,13 @@ export function init(RuntimeName, PHPLoader) {
24530
24833
  } catch (e) {}
24531
24834
  event.preventDefault();
24532
24835
  GLUT.saveModifiers(event);
24533
- ((a1, a2, a3, a4) => {})(
24534
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
24535
- 'button'
24536
- ],
24836
+ ((
24837
+ a1,
24838
+ a2,
24839
+ a3,
24840
+ a4
24841
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24842
+ event['button'],
24537
24843
  0 /*GLUT_DOWN*/,
24538
24844
  Browser.mouseX,
24539
24845
  Browser.mouseY
@@ -24548,10 +24854,13 @@ export function init(RuntimeName, PHPLoader) {
24548
24854
  if (GLUT.mouseFunc) {
24549
24855
  event.preventDefault();
24550
24856
  GLUT.saveModifiers(event);
24551
- ((a1, a2, a3, a4) => {})(
24552
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
24553
- 'button'
24554
- ],
24857
+ ((
24858
+ a1,
24859
+ a2,
24860
+ a3,
24861
+ a4
24862
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24863
+ event['button'],
24555
24864
  1 /*GLUT_UP*/,
24556
24865
  Browser.mouseX,
24557
24866
  Browser.mouseY
@@ -24580,8 +24889,13 @@ export function init(RuntimeName, PHPLoader) {
24580
24889
  if (GLUT.mouseFunc) {
24581
24890
  event.preventDefault();
24582
24891
  GLUT.saveModifiers(event);
24583
- ((a1, a2, a3, a4) => {})(
24584
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
24892
+ ((
24893
+ a1,
24894
+ a2,
24895
+ a3,
24896
+ a4
24897
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24898
+ button,
24585
24899
  0 /*GLUT_DOWN*/,
24586
24900
  Browser.mouseX,
24587
24901
  Browser.mouseY
@@ -24619,8 +24933,11 @@ export function init(RuntimeName, PHPLoader) {
24619
24933
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
24620
24934
  if (GLUT.reshapeFunc) {
24621
24935
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
24622
- ((a1, a2) => {})(
24623
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
24936
+ ((
24937
+ a1,
24938
+ a2
24939
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24940
+ width,
24624
24941
  height
24625
24942
  );
24626
24943
  }
@@ -24676,8 +24993,11 @@ export function init(RuntimeName, PHPLoader) {
24676
24993
  // Resize callback stage 2: updateResizeListeners notifies reshapeFunc
24677
24994
  Browser.resizeListeners.push((width, height) => {
24678
24995
  if (GLUT.reshapeFunc) {
24679
- ((a1, a2) => {})(
24680
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
24996
+ ((
24997
+ a1,
24998
+ a2
24999
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25000
+ width,
24681
25001
  height
24682
25002
  );
24683
25003
  }
@@ -24792,8 +25112,10 @@ export function init(RuntimeName, PHPLoader) {
24792
25112
  var _glutTimerFunc = (msec, func, value) =>
24793
25113
  safeSetTimeout(
24794
25114
  () =>
24795
- ((a1) => {})(
24796
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25115
+ ((
25116
+ a1
25117
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25118
+ value
24797
25119
  ),
24798
25120
  msec
24799
25121
  );
@@ -24953,8 +25275,11 @@ export function init(RuntimeName, PHPLoader) {
24953
25275
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
24954
25276
  // Just call it once here.
24955
25277
  if (GLUT.reshapeFunc) {
24956
- ((a1, a2) => {})(
24957
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25278
+ ((
25279
+ a1,
25280
+ a2
25281
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25282
+ width,
24958
25283
  height
24959
25284
  );
24960
25285
  }
@@ -26008,15 +26333,21 @@ export function init(RuntimeName, PHPLoader) {
26008
26333
  callUserCallback(() => {
26009
26334
  if (error) {
26010
26335
  if (onerror)
26011
- ((a1) => {})(
26012
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26336
+ ((
26337
+ a1
26338
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26339
+ arg
26013
26340
  );
26014
26341
  return;
26015
26342
  }
26016
26343
  var buffer = _malloc(byteArray.length);
26017
26344
  HEAPU8.set(byteArray, buffer);
26018
- ((a1, a2, a3) => {})(
26019
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26345
+ ((
26346
+ a1,
26347
+ a2,
26348
+ a3
26349
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26350
+ arg,
26020
26351
  buffer,
26021
26352
  byteArray.length
26022
26353
  );
@@ -26048,14 +26379,18 @@ export function init(RuntimeName, PHPLoader) {
26048
26379
  callUserCallback(() => {
26049
26380
  if (error) {
26050
26381
  if (onerror)
26051
- ((a1) => {})(
26052
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26382
+ ((
26383
+ a1
26384
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26385
+ arg
26053
26386
  );
26054
26387
  return;
26055
26388
  }
26056
26389
  if (onstore)
26057
- ((a1) => {})(
26058
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26390
+ ((
26391
+ a1
26392
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26393
+ arg
26059
26394
  );
26060
26395
  });
26061
26396
  }
@@ -26070,14 +26405,18 @@ export function init(RuntimeName, PHPLoader) {
26070
26405
  callUserCallback(() => {
26071
26406
  if (error) {
26072
26407
  if (onerror)
26073
- ((a1) => {})(
26074
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26408
+ ((
26409
+ a1
26410
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26411
+ arg
26075
26412
  );
26076
26413
  return;
26077
26414
  }
26078
26415
  if (ondelete)
26079
- ((a1) => {})(
26080
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26416
+ ((
26417
+ a1
26418
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26419
+ arg
26081
26420
  );
26082
26421
  });
26083
26422
  });
@@ -26094,14 +26433,19 @@ export function init(RuntimeName, PHPLoader) {
26094
26433
  callUserCallback(() => {
26095
26434
  if (error) {
26096
26435
  if (onerror)
26097
- ((a1) => {})(
26098
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26436
+ ((
26437
+ a1
26438
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26439
+ arg
26099
26440
  );
26100
26441
  return;
26101
26442
  }
26102
26443
  if (oncheck)
26103
- ((a1, a2) => {})(
26104
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26444
+ ((
26445
+ a1,
26446
+ a2
26447
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26448
+ arg,
26105
26449
  exists
26106
26450
  );
26107
26451
  });
@@ -26117,14 +26461,18 @@ export function init(RuntimeName, PHPLoader) {
26117
26461
  callUserCallback(() => {
26118
26462
  if (error) {
26119
26463
  if (onerror)
26120
- ((a1) => {})(
26121
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26464
+ ((
26465
+ a1
26466
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26467
+ arg
26122
26468
  );
26123
26469
  return;
26124
26470
  }
26125
26471
  if (onclear)
26126
- ((a1) => {})(
26127
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26472
+ ((
26473
+ a1
26474
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26475
+ arg
26128
26476
  );
26129
26477
  });
26130
26478
  });
@@ -26281,8 +26629,11 @@ export function init(RuntimeName, PHPLoader) {
26281
26629
  safeSetTimeout(() => {
26282
26630
  var stackBegin = Asyncify.currData + 12;
26283
26631
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
26284
- ((a1, a2) => {})(
26285
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
26632
+ ((
26633
+ a1,
26634
+ a2
26635
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26636
+ stackBegin,
26286
26637
  stackEnd
26287
26638
  );
26288
26639
  wakeUp();
@@ -26331,8 +26682,10 @@ export function init(RuntimeName, PHPLoader) {
26331
26682
  HEAPU32[(newFiber + 12) >> 2] = 0;
26332
26683
 
26333
26684
  var userData = HEAPU32[(newFiber + 16) >> 2];
26334
- ((a1) => {})(
26335
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
26685
+ ((
26686
+ a1
26687
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26688
+ userData
26336
26689
  );
26337
26690
  } else {
26338
26691
  var asyncifyData = newFiber + 20;
@@ -27343,8 +27696,11 @@ export function init(RuntimeName, PHPLoader) {
27343
27696
  if (!SDL.eventHandler) return;
27344
27697
 
27345
27698
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
27346
- ((a1, a2) => {})(
27347
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
27699
+ ((
27700
+ a1,
27701
+ a2
27702
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27703
+ SDL.eventHandlerContext,
27348
27704
  SDL.eventHandlerTemp
27349
27705
  );
27350
27706
  }
@@ -28968,9 +29324,12 @@ export function init(RuntimeName, PHPLoader) {
28968
29324
  return;
28969
29325
 
28970
29326
  // Ask SDL audio data from the user code.
28971
- ((a1, a2, a3) => {})(
28972
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
28973
- .audio.userdata,
29327
+ ((
29328
+ a1,
29329
+ a2,
29330
+ a3
29331
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29332
+ SDL.audio.userdata,
28974
29333
  SDL.audio.buffer,
28975
29334
  SDL.audio.bufferSize
28976
29335
  );
@@ -29428,8 +29787,10 @@ export function init(RuntimeName, PHPLoader) {
29428
29787
  info.audio = null;
29429
29788
  }
29430
29789
  if (SDL.channelFinished) {
29431
- ((a1) => {})(
29432
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
29790
+ ((
29791
+ a1
29792
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29793
+ channel
29433
29794
  );
29434
29795
  }
29435
29796
  }
@@ -29497,8 +29858,10 @@ export function init(RuntimeName, PHPLoader) {
29497
29858
  channelInfo.audio = null;
29498
29859
  }
29499
29860
  if (SDL.channelFinished)
29500
- ((a1) => {})(
29501
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
29861
+ ((
29862
+ a1
29863
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29864
+ channel
29502
29865
  );
29503
29866
  };
29504
29867
  if (channelInfo.audio) {
@@ -30233,8 +30596,11 @@ export function init(RuntimeName, PHPLoader) {
30233
30596
  var _SDL_AddTimer = (interval, callback, param) =>
30234
30597
  safeSetTimeout(
30235
30598
  () =>
30236
- ((a1, a2) => {})(
30237
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
30599
+ ((
30600
+ a1,
30601
+ a2
30602
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30603
+ interval,
30238
30604
  param
30239
30605
  ),
30240
30606
  interval
@@ -30467,26 +30833,6 @@ export function init(RuntimeName, PHPLoader) {
30467
30833
  });
30468
30834
  };
30469
30835
 
30470
- function _recv(sockfd, buffer, size, flags) {
30471
- return _wasm_recv(sockfd, buffer, size, flags);
30472
- }
30473
-
30474
- function _setsockopt(
30475
- socketd,
30476
- level,
30477
- optionName,
30478
- optionValuePtr,
30479
- optionLen
30480
- ) {
30481
- return _wasm_setsockopt(
30482
- socketd,
30483
- level,
30484
- optionName,
30485
- optionValuePtr,
30486
- optionLen
30487
- );
30488
- }
30489
-
30490
30836
  var _getcontext = () => abort('missing function: ${name}');
30491
30837
 
30492
30838
  var _makecontext = () => abort('missing function: ${name}');
@@ -30656,8 +31002,12 @@ export function init(RuntimeName, PHPLoader) {
30656
31002
 
30657
31003
  socket.onopen = function (e) {
30658
31004
  var eventPtr = WS.getSocketEvent(socketId);
30659
- ((a1, a2, a3) => {})(
30660
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31005
+ ((
31006
+ a1,
31007
+ a2,
31008
+ a3
31009
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31010
+ 0 /*TODO*/,
30661
31011
  eventPtr,
30662
31012
  userData
30663
31013
  );
@@ -30679,8 +31029,12 @@ export function init(RuntimeName, PHPLoader) {
30679
31029
 
30680
31030
  socket.onerror = function (e) {
30681
31031
  var eventPtr = WS.getSocketEvent(socketId);
30682
- ((a1, a2, a3) => {})(
30683
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31032
+ ((
31033
+ a1,
31034
+ a2,
31035
+ a3
31036
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31037
+ 0 /*TODO*/,
30684
31038
  eventPtr,
30685
31039
  userData
30686
31040
  );
@@ -30705,8 +31059,12 @@ export function init(RuntimeName, PHPLoader) {
30705
31059
  ((HEAP8[eventPtr + 4] = e.wasClean),
30706
31060
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
30707
31061
  stringToUTF8(e.reason, eventPtr + 8, 512));
30708
- ((a1, a2, a3) => {})(
30709
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31062
+ ((
31063
+ a1,
31064
+ a2,
31065
+ a3
31066
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31067
+ 0 /*TODO*/,
30710
31068
  eventPtr,
30711
31069
  userData
30712
31070
  );
@@ -30740,8 +31098,12 @@ export function init(RuntimeName, PHPLoader) {
30740
31098
  ((HEAPU32[(eventPtr + 4) >> 2] = buf),
30741
31099
  (HEAP32[(eventPtr + 8) >> 2] = len),
30742
31100
  (HEAP8[eventPtr + 12] = isText),
30743
- ((a1, a2, a3) => {})(
30744
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31101
+ ((
31102
+ a1,
31103
+ a2,
31104
+ a3
31105
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31106
+ 0 /*TODO*/,
30745
31107
  eventPtr,
30746
31108
  userData
30747
31109
  ));
@@ -30985,20 +31347,18 @@ export function init(RuntimeName, PHPLoader) {
30985
31347
  Module['___cxa_rethrow_primary_exception'] =
30986
31348
  ___cxa_rethrow_primary_exception;
30987
31349
  Module['___syscall_shutdown'] = ___syscall_shutdown;
30988
- Module['_recv'] = _recv;
30989
- Module['_setsockopt'] = _setsockopt;
30990
31350
  // End JS library exports
30991
31351
 
30992
31352
  // end include: postlibrary.js
30993
31353
 
30994
31354
  var ASM_CONSTS = {
30995
- 11305393: ($0) => {
31355
+ 11305345: ($0) => {
30996
31356
  if (!$0) {
30997
31357
  AL.alcErr = 0xa004;
30998
31358
  return 1;
30999
31359
  }
31000
31360
  },
31001
- 11305441: ($0) => {
31361
+ 11305393: ($0) => {
31002
31362
  if (!AL.currentCtx) {
31003
31363
  err('alGetProcAddress() called without a valid context');
31004
31364
  return 1;
@@ -31373,7 +31733,7 @@ export function init(RuntimeName, PHPLoader) {
31373
31733
  wasmMemory;
31374
31734
 
31375
31735
  function assignWasmExports(wasmExports) {
31376
- _free = PHPLoader['free'] = wasmExports['free'];
31736
+ _free = wasmExports['free'];
31377
31737
  _memcmp = wasmExports['memcmp'];
31378
31738
  _malloc =
31379
31739
  PHPLoader['malloc'] =
@@ -31441,7 +31801,10 @@ export function init(RuntimeName, PHPLoader) {
31441
31801
  wasmExports['wasm_sapi_handle_request'];
31442
31802
  _php_wasm_init = Module['_php_wasm_init'] =
31443
31803
  wasmExports['php_wasm_init'];
31444
- _wasm_free = Module['_wasm_free'] = wasmExports['wasm_free'];
31804
+ _wasm_free =
31805
+ PHPLoader['free'] =
31806
+ Module['_wasm_free'] =
31807
+ wasmExports['wasm_free'];
31445
31808
  _wasm_get_end_offset = Module['_wasm_get_end_offset'] =
31446
31809
  wasmExports['wasm_get_end_offset'];
31447
31810
  ___wrap_getpid = Module['___wrap_getpid'] =
@@ -34073,12 +34436,8 @@ export function init(RuntimeName, PHPLoader) {
34073
34436
  wasm_poll_socket,
34074
34437
  /** @export */
34075
34438
  wasm_recv: _wasm_recv,
34076
- /** */
34077
- recv: _recv,
34078
34439
  /** @export */
34079
34440
  wasm_setsockopt: _wasm_setsockopt,
34080
- /** */
34081
- setsockopt: _setsockopt,
34082
34441
  /** @export */
34083
34442
  wasm_shutdown: _wasm_shutdown,
34084
34443
  /** @export */