@php-wasm/node-8-1 3.1.2 → 3.1.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -15,7 +15,7 @@ const currentDirPath =
15
15
  : path.dirname(fileURLToPath(import.meta.url));
16
16
  const dependencyFilename = path.join(currentDirPath, '8_1_34', 'php_8_1.wasm');
17
17
  export { dependencyFilename };
18
- export const dependenciesTotalSize = 27231599;
18
+ export const dependenciesTotalSize = 27245645;
19
19
  const phpVersionString = '8.1.34';
20
20
  export function init(RuntimeName, PHPLoader) {
21
21
  // The rest of the code comes from the built php.js file and esm-suffix.js
@@ -5125,8 +5125,10 @@ export function init(RuntimeName, PHPLoader) {
5125
5125
  );
5126
5126
 
5127
5127
  var ___call_sighandler = (fp, sig) =>
5128
- ((a1) => {})(
5129
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
5128
+ ((
5129
+ a1
5130
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
5131
+ sig
5130
5132
  );
5131
5133
  ___call_sighandler.sig = 'vpi';
5132
5134
 
@@ -6539,6 +6541,9 @@ export function init(RuntimeName, PHPLoader) {
6539
6541
 
6540
6542
  var allocateUTF8OnStack = (...args) => stringToUTF8OnStack(...args);
6541
6543
 
6544
+ var onInits = [];
6545
+ var addOnInit = (cb) => onInits.push(cb);
6546
+
6542
6547
  function _js_getpid() {
6543
6548
  return PHPLoader.processId ?? 42;
6544
6549
  }
@@ -6562,10 +6567,13 @@ export function init(RuntimeName, PHPLoader) {
6562
6567
  * are not yet assigned.
6563
6568
  */
6564
6569
  addOnInit(() => {
6570
+ if (typeof PHPLoader.processId !== 'number') {
6571
+ throw new Error(
6572
+ 'PHPLoader.processId must be set before init'
6573
+ );
6574
+ }
6565
6575
  Module['userSpace'] = PHPLoader.bindUserSpace({
6566
- // TODO: Require PID instead of defaulting to 42.
6567
- pid: PHPLoader.processId ?? 42,
6568
- // TODO: When receiving this context, validate that all these fields exist.
6576
+ pid: PHPLoader.processId,
6569
6577
  constants: {
6570
6578
  F_GETFL: Number('3'),
6571
6579
  O_ACCMODE: Number('2097155'),
@@ -6606,19 +6614,107 @@ export function init(RuntimeName, PHPLoader) {
6606
6614
  LOCK_UN: 8, // Unlock
6607
6615
  },
6608
6616
  errnoCodes: ERRNO_CODES,
6617
+ // Use get/set closures instead of exposing
6618
+ // typed arrays directly. After memory.grow(),
6619
+ // Emscripten's updateMemoryViews() reassigns
6620
+ // the module-scoped HEAP* variables. Closures
6621
+ // always reference the current value, so
6622
+ // accesses are never stale. The get/set
6623
+ // interface also prevents callers from
6624
+ // capturing a typed array reference that
6625
+ // could become stale.
6609
6626
  memory: {
6610
- HEAP8,
6611
- HEAPU8,
6612
- HEAP16,
6613
- HEAPU16,
6614
- HEAP32,
6615
- HEAPU32,
6616
- HEAPF32,
6617
- HEAP64,
6618
- HEAPU64,
6619
- HEAPF64,
6627
+ HEAP8: {
6628
+ get(offset) {
6629
+ return HEAP8[offset];
6630
+ },
6631
+ set(offset, value) {
6632
+ HEAP8[offset] = value;
6633
+ },
6634
+ },
6635
+ HEAPU8: {
6636
+ get(offset) {
6637
+ return HEAPU8[offset];
6638
+ },
6639
+ set(offset, value) {
6640
+ HEAPU8[offset] = value;
6641
+ },
6642
+ },
6643
+ HEAP16: {
6644
+ get(offset) {
6645
+ return HEAP16[offset];
6646
+ },
6647
+ set(offset, value) {
6648
+ HEAP16[offset] = value;
6649
+ },
6650
+ },
6651
+ HEAPU16: {
6652
+ get(offset) {
6653
+ return HEAPU16[offset];
6654
+ },
6655
+ set(offset, value) {
6656
+ HEAPU16[offset] = value;
6657
+ },
6658
+ },
6659
+ HEAP32: {
6660
+ get(offset) {
6661
+ return HEAP32[offset];
6662
+ },
6663
+ set(offset, value) {
6664
+ HEAP32[offset] = value;
6665
+ },
6666
+ },
6667
+ HEAPU32: {
6668
+ get(offset) {
6669
+ return HEAPU32[offset];
6670
+ },
6671
+ set(offset, value) {
6672
+ HEAPU32[offset] = value;
6673
+ },
6674
+ },
6675
+ HEAPF32: {
6676
+ get(offset) {
6677
+ return HEAPF32[offset];
6678
+ },
6679
+ set(offset, value) {
6680
+ HEAPF32[offset] = value;
6681
+ },
6682
+ },
6683
+ HEAP64: {
6684
+ get(offset) {
6685
+ return HEAP64[offset];
6686
+ },
6687
+ set(offset, value) {
6688
+ HEAP64[offset] = value;
6689
+ },
6690
+ },
6691
+ HEAPU64: {
6692
+ get(offset) {
6693
+ return HEAPU64[offset];
6694
+ },
6695
+ set(offset, value) {
6696
+ HEAPU64[offset] = value;
6697
+ },
6698
+ },
6699
+ HEAPF64: {
6700
+ get(offset) {
6701
+ return HEAPF64[offset];
6702
+ },
6703
+ set(offset, value) {
6704
+ HEAPF64[offset] = value;
6705
+ },
6706
+ },
6620
6707
  },
6621
- wasmImports,
6708
+ wasmImports: Object.assign(
6709
+ {},
6710
+ wasmImports,
6711
+ typeof _builtin_fd_close === 'function'
6712
+ ? { builtin_fd_close: _builtin_fd_close }
6713
+ : {},
6714
+ typeof _builtin_fcntl64 === 'function'
6715
+ ? { builtin_fcntl64: _builtin_fcntl64 }
6716
+ : {}
6717
+ ),
6622
6718
  wasmExports,
6623
6719
  syscalls: SYSCALLS,
6624
6720
  FS,
@@ -8503,8 +8599,11 @@ export function init(RuntimeName, PHPLoader) {
8503
8599
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8504
8600
  runtimeKeepalivePop();
8505
8601
  callUserCallback(() =>
8506
- ((a1, a2) => {})(
8507
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8602
+ ((
8603
+ a1,
8604
+ a2
8605
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8606
+ handle,
8508
8607
  user_data
8509
8608
  )
8510
8609
  );
@@ -8512,8 +8611,11 @@ export function init(RuntimeName, PHPLoader) {
8512
8611
  function successCallback() {
8513
8612
  runtimeKeepalivePop();
8514
8613
  callUserCallback(() =>
8515
- ((a1, a2) => {})(
8516
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8614
+ ((
8615
+ a1,
8616
+ a2
8617
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8618
+ handle,
8517
8619
  user_data
8518
8620
  )
8519
8621
  );
@@ -17035,9 +17137,9 @@ export function init(RuntimeName, PHPLoader) {
17035
17137
  if (!cp.stdin.closed) {
17036
17138
  cp.stdin.end();
17037
17139
  }
17038
- _free(buffer);
17039
- _free(iov);
17040
- _free(pnum);
17140
+ _wasm_free(buffer);
17141
+ _wasm_free(iov);
17142
+ _wasm_free(pnum);
17041
17143
  }
17042
17144
 
17043
17145
  // pump() can never alter the result of this function.
@@ -17764,7 +17866,17 @@ export function init(RuntimeName, PHPLoader) {
17764
17866
  // A true async operation was begun; start a sleep.
17765
17867
  Asyncify.state = Asyncify.State.Unwinding;
17766
17868
  // TODO: reuse, don't alloc/free every sleep
17767
- Asyncify.currData = Asyncify.allocateData();
17869
+ if (!Asyncify._cachedData) {
17870
+ Asyncify._cachedData = Asyncify.allocateData();
17871
+ } else {
17872
+ Asyncify.setDataHeader(
17873
+ Asyncify._cachedData,
17874
+ Asyncify._cachedData + 12,
17875
+ Asyncify.StackSize
17876
+ );
17877
+ Asyncify.setDataRewindFunc(Asyncify._cachedData);
17878
+ }
17879
+ Asyncify.currData = Asyncify._cachedData;
17768
17880
  if (typeof MainLoop != 'undefined' && MainLoop.func) {
17769
17881
  MainLoop.pause();
17770
17882
  }
@@ -17776,7 +17888,6 @@ export function init(RuntimeName, PHPLoader) {
17776
17888
  // Stop a resume.
17777
17889
  Asyncify.state = Asyncify.State.Normal;
17778
17890
  runAndAbortIfError(_asyncify_stop_rewind);
17779
- _free(Asyncify.currData);
17780
17891
  Asyncify.currData = null;
17781
17892
  // Call all sleep callbacks now that the sleep-resume is all done.
17782
17893
  Asyncify.sleepCallbacks.forEach(callUserCallback);
@@ -18105,8 +18216,11 @@ export function init(RuntimeName, PHPLoader) {
18105
18216
  var trace = getCallstack();
18106
18217
  var parts = trace.split('\n');
18107
18218
  for (var i = 0; i < parts.length; i++) {
18108
- var ret = ((a1, a2) => {})(
18109
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
18219
+ var ret = ((
18220
+ a1,
18221
+ a2
18222
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18223
+ 0,
18110
18224
  arg
18111
18225
  );
18112
18226
  if (ret !== 0) return;
@@ -18210,10 +18324,6 @@ export function init(RuntimeName, PHPLoader) {
18210
18324
  };
18211
18325
  __emscripten_fs_load_embedded_files.sig = 'vp';
18212
18326
 
18213
- var onInits = [];
18214
-
18215
- var addOnInit = (cb) => onInits.push(cb);
18216
-
18217
18327
  var onMains = [];
18218
18328
 
18219
18329
  var addOnPreMain = (cb) => onMains.push(cb);
@@ -18650,8 +18760,12 @@ export function init(RuntimeName, PHPLoader) {
18650
18760
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
18651
18761
 
18652
18762
  if (
18653
- ((a1, a2, a3) => {})(
18654
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
18763
+ ((
18764
+ a1,
18765
+ a2,
18766
+ a3
18767
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18768
+ eventTypeId,
18655
18769
  keyEventData,
18656
18770
  userData
18657
18771
  )
@@ -18769,8 +18883,12 @@ export function init(RuntimeName, PHPLoader) {
18769
18883
  fillMouseEventData(JSEvents.mouseEvent, e, target);
18770
18884
 
18771
18885
  if (
18772
- ((a1, a2, a3) => {})(
18773
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
18886
+ ((
18887
+ a1,
18888
+ a2,
18889
+ a3
18890
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18891
+ eventTypeId,
18774
18892
  JSEvents.mouseEvent,
18775
18893
  userData
18776
18894
  )
@@ -18984,8 +19102,12 @@ export function init(RuntimeName, PHPLoader) {
18984
19102
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
18985
19103
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
18986
19104
  if (
18987
- ((a1, a2, a3) => {})(
18988
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19105
+ ((
19106
+ a1,
19107
+ a2,
19108
+ a3
19109
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19110
+ eventTypeId,
18989
19111
  wheelEvent,
18990
19112
  userData
18991
19113
  )
@@ -19066,8 +19188,12 @@ export function init(RuntimeName, PHPLoader) {
19066
19188
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
19067
19189
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
19068
19190
  if (
19069
- ((a1, a2, a3) => {})(
19070
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19191
+ ((
19192
+ a1,
19193
+ a2,
19194
+ a3
19195
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19196
+ eventTypeId,
19071
19197
  uiEvent,
19072
19198
  userData
19073
19199
  )
@@ -19141,8 +19267,12 @@ export function init(RuntimeName, PHPLoader) {
19141
19267
  stringToUTF8(id, focusEvent + 128, 128);
19142
19268
 
19143
19269
  if (
19144
- ((a1, a2, a3) => {})(
19145
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19270
+ ((
19271
+ a1,
19272
+ a2,
19273
+ a3
19274
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19275
+ eventTypeId,
19146
19276
  focusEvent,
19147
19277
  userData
19148
19278
  )
@@ -19258,8 +19388,12 @@ export function init(RuntimeName, PHPLoader) {
19258
19388
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
19259
19389
 
19260
19390
  if (
19261
- ((a1, a2, a3) => {})(
19262
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19391
+ ((
19392
+ a1,
19393
+ a2,
19394
+ a3
19395
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19396
+ eventTypeId,
19263
19397
  JSEvents.deviceOrientationEvent,
19264
19398
  userData
19265
19399
  )
@@ -19343,8 +19477,12 @@ export function init(RuntimeName, PHPLoader) {
19343
19477
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
19344
19478
 
19345
19479
  if (
19346
- ((a1, a2, a3) => {})(
19347
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19480
+ ((
19481
+ a1,
19482
+ a2,
19483
+ a3
19484
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19485
+ eventTypeId,
19348
19486
  JSEvents.deviceMotionEvent,
19349
19487
  userData
19350
19488
  )
@@ -19451,8 +19589,12 @@ export function init(RuntimeName, PHPLoader) {
19451
19589
  fillOrientationChangeEventData(orientationChangeEvent);
19452
19590
 
19453
19591
  if (
19454
- ((a1, a2, a3) => {})(
19455
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19592
+ ((
19593
+ a1,
19594
+ a2,
19595
+ a3
19596
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19597
+ eventTypeId,
19456
19598
  orientationChangeEvent,
19457
19599
  userData
19458
19600
  )
@@ -19581,8 +19723,12 @@ export function init(RuntimeName, PHPLoader) {
19581
19723
  fillFullscreenChangeEventData(fullscreenChangeEvent);
19582
19724
 
19583
19725
  if (
19584
- ((a1, a2, a3) => {})(
19585
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19726
+ ((
19727
+ a1,
19728
+ a2,
19729
+ a3
19730
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19731
+ eventTypeId,
19586
19732
  fullscreenChangeEvent,
19587
19733
  userData
19588
19734
  )
@@ -19727,8 +19873,12 @@ export function init(RuntimeName, PHPLoader) {
19727
19873
  );
19728
19874
 
19729
19875
  if (currentFullscreenStrategy.canvasResizedCallback) {
19730
- ((a1, a2, a3) => {})(
19731
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
19876
+ ((
19877
+ a1,
19878
+ a2,
19879
+ a3
19880
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19881
+ 37,
19732
19882
  0,
19733
19883
  currentFullscreenStrategy.canvasResizedCallbackUserData
19734
19884
  );
@@ -19829,8 +19979,12 @@ export function init(RuntimeName, PHPLoader) {
19829
19979
  currentFullscreenStrategy = strategy;
19830
19980
 
19831
19981
  if (strategy.canvasResizedCallback) {
19832
- ((a1, a2, a3) => {})(
19833
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
19982
+ ((
19983
+ a1,
19984
+ a2,
19985
+ a3
19986
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19987
+ 37,
19834
19988
  0,
19835
19989
  strategy.canvasResizedCallbackUserData
19836
19990
  );
@@ -19930,8 +20084,12 @@ export function init(RuntimeName, PHPLoader) {
19930
20084
  !inCenteredWithoutScalingFullscreenMode &&
19931
20085
  currentFullscreenStrategy.canvasResizedCallback
19932
20086
  ) {
19933
- ((a1, a2, a3) => {})(
19934
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20087
+ ((
20088
+ a1,
20089
+ a2,
20090
+ a3
20091
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20092
+ 37,
19935
20093
  0,
19936
20094
  currentFullscreenStrategy.canvasResizedCallbackUserData
19937
20095
  );
@@ -20030,8 +20188,12 @@ export function init(RuntimeName, PHPLoader) {
20030
20188
  softFullscreenResizeWebGLRenderTarget
20031
20189
  );
20032
20190
  if (strategy.canvasResizedCallback) {
20033
- ((a1, a2, a3) => {})(
20034
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20191
+ ((
20192
+ a1,
20193
+ a2,
20194
+ a3
20195
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20196
+ 37,
20035
20197
  0,
20036
20198
  strategy.canvasResizedCallbackUserData
20037
20199
  );
@@ -20044,8 +20206,12 @@ export function init(RuntimeName, PHPLoader) {
20044
20206
 
20045
20207
  // Inform the caller that the canvas size has changed.
20046
20208
  if (strategy.canvasResizedCallback) {
20047
- ((a1, a2, a3) => {})(
20048
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20209
+ ((
20210
+ a1,
20211
+ a2,
20212
+ a3
20213
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20214
+ 37,
20049
20215
  0,
20050
20216
  strategy.canvasResizedCallbackUserData
20051
20217
  );
@@ -20107,8 +20273,12 @@ export function init(RuntimeName, PHPLoader) {
20107
20273
  fillPointerlockChangeEventData(pointerlockChangeEvent);
20108
20274
 
20109
20275
  if (
20110
- ((a1, a2, a3) => {})(
20111
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20276
+ ((
20277
+ a1,
20278
+ a2,
20279
+ a3
20280
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20281
+ eventTypeId,
20112
20282
  pointerlockChangeEvent,
20113
20283
  userData
20114
20284
  )
@@ -20162,8 +20332,12 @@ export function init(RuntimeName, PHPLoader) {
20162
20332
  ) => {
20163
20333
  var pointerlockErrorEventHandlerFunc = (e = event) => {
20164
20334
  if (
20165
- ((a1, a2, a3) => {})(
20166
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20335
+ ((
20336
+ a1,
20337
+ a2,
20338
+ a3
20339
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20340
+ eventTypeId,
20167
20341
  0,
20168
20342
  userData
20169
20343
  )
@@ -20317,8 +20491,12 @@ export function init(RuntimeName, PHPLoader) {
20317
20491
  fillVisibilityChangeEventData(visibilityChangeEvent);
20318
20492
 
20319
20493
  if (
20320
- ((a1, a2, a3) => {})(
20321
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20494
+ ((
20495
+ a1,
20496
+ a2,
20497
+ a3
20498
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20499
+ eventTypeId,
20322
20500
  visibilityChangeEvent,
20323
20501
  userData
20324
20502
  )
@@ -20438,8 +20616,12 @@ export function init(RuntimeName, PHPLoader) {
20438
20616
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
20439
20617
 
20440
20618
  if (
20441
- ((a1, a2, a3) => {})(
20442
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20619
+ ((
20620
+ a1,
20621
+ a2,
20622
+ a3
20623
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20624
+ eventTypeId,
20443
20625
  touchEvent,
20444
20626
  userData
20445
20627
  )
@@ -20577,8 +20759,12 @@ export function init(RuntimeName, PHPLoader) {
20577
20759
  fillGamepadEventData(gamepadEvent, e['gamepad']);
20578
20760
 
20579
20761
  if (
20580
- ((a1, a2, a3) => {})(
20581
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20762
+ ((
20763
+ a1,
20764
+ a2,
20765
+ a3
20766
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20767
+ eventTypeId,
20582
20768
  gamepadEvent,
20583
20769
  userData
20584
20770
  )
@@ -20680,8 +20866,12 @@ export function init(RuntimeName, PHPLoader) {
20680
20866
  ) => {
20681
20867
  var beforeUnloadEventHandlerFunc = (e = event) => {
20682
20868
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
20683
- var confirmationMessage = ((a1, a2, a3) => {})(
20684
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20869
+ var confirmationMessage = ((
20870
+ a1,
20871
+ a2,
20872
+ a3
20873
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20874
+ eventTypeId,
20685
20875
  0,
20686
20876
  userData
20687
20877
  );
@@ -20752,8 +20942,12 @@ export function init(RuntimeName, PHPLoader) {
20752
20942
  fillBatteryEventData(batteryEvent, battery);
20753
20943
 
20754
20944
  if (
20755
- ((a1, a2, a3) => {})(
20756
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20945
+ ((
20946
+ a1,
20947
+ a2,
20948
+ a3
20949
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20950
+ eventTypeId,
20757
20951
  batteryEvent,
20758
20952
  userData
20759
20953
  )
@@ -20855,8 +21049,11 @@ export function init(RuntimeName, PHPLoader) {
20855
21049
 
20856
21050
  var _emscripten_request_animation_frame = (cb, userData) =>
20857
21051
  requestAnimationFrame((timeStamp) =>
20858
- ((a1, a2) => {})(
20859
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21052
+ ((
21053
+ a1,
21054
+ a2
21055
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21056
+ timeStamp,
20860
21057
  userData
20861
21058
  )
20862
21059
  );
@@ -20868,8 +21065,11 @@ export function init(RuntimeName, PHPLoader) {
20868
21065
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
20869
21066
  function tick(timeStamp) {
20870
21067
  if (
20871
- ((a1, a2) => {})(
20872
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21068
+ ((
21069
+ a1,
21070
+ a2
21071
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21072
+ timeStamp,
20873
21073
  userData
20874
21074
  )
20875
21075
  ) {
@@ -21126,8 +21326,10 @@ export function init(RuntimeName, PHPLoader) {
21126
21326
  return emSetImmediate(() => {
21127
21327
  runtimeKeepalivePop();
21128
21328
  callUserCallback(() =>
21129
- ((a1) => {})(
21130
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21329
+ ((
21330
+ a1
21331
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21332
+ userData
21131
21333
  )
21132
21334
  );
21133
21335
  });
@@ -21144,8 +21346,10 @@ export function init(RuntimeName, PHPLoader) {
21144
21346
  function tick() {
21145
21347
  callUserCallback(() => {
21146
21348
  if (
21147
- ((a1) => {})(
21148
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21349
+ ((
21350
+ a1
21351
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21352
+ userData
21149
21353
  )
21150
21354
  ) {
21151
21355
  emSetImmediate(tick);
@@ -21162,8 +21366,10 @@ export function init(RuntimeName, PHPLoader) {
21162
21366
  var _emscripten_set_timeout = (cb, msecs, userData) =>
21163
21367
  safeSetTimeout(
21164
21368
  () =>
21165
- ((a1) => {})(
21166
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21369
+ ((
21370
+ a1
21371
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21372
+ userData
21167
21373
  ),
21168
21374
  msecs
21169
21375
  );
@@ -21179,8 +21385,11 @@ export function init(RuntimeName, PHPLoader) {
21179
21385
  runtimeKeepalivePop();
21180
21386
  callUserCallback(() => {
21181
21387
  if (
21182
- ((a1, a2) => {})(
21183
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
21388
+ ((
21389
+ a1,
21390
+ a2
21391
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21392
+ t,
21184
21393
  userData
21185
21394
  )
21186
21395
  ) {
@@ -21204,8 +21413,10 @@ export function init(RuntimeName, PHPLoader) {
21204
21413
  runtimeKeepalivePush();
21205
21414
  return setInterval(() => {
21206
21415
  callUserCallback(() =>
21207
- ((a1) => {})(
21208
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21416
+ ((
21417
+ a1
21418
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21419
+ userData
21209
21420
  )
21210
21421
  );
21211
21422
  }, msecs);
@@ -21220,8 +21431,10 @@ export function init(RuntimeName, PHPLoader) {
21220
21431
 
21221
21432
  var _emscripten_async_call = (func, arg, millis) => {
21222
21433
  var wrapper = () =>
21223
- ((a1) => {})(
21224
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21434
+ ((
21435
+ a1
21436
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21437
+ arg
21225
21438
  );
21226
21439
 
21227
21440
  if (
@@ -21254,7 +21467,7 @@ export function init(RuntimeName, PHPLoader) {
21254
21467
 
21255
21468
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
21256
21469
  var iterFunc =
21257
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
21470
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
21258
21471
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
21259
21472
  };
21260
21473
  _emscripten_set_main_loop.sig = 'vpii';
@@ -21266,8 +21479,10 @@ export function init(RuntimeName, PHPLoader) {
21266
21479
  simulateInfiniteLoop
21267
21480
  ) => {
21268
21481
  var iterFunc = () =>
21269
- ((a1) => {})(
21270
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21482
+ ((
21483
+ a1
21484
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21485
+ arg
21271
21486
  );
21272
21487
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
21273
21488
  };
@@ -21288,8 +21503,10 @@ export function init(RuntimeName, PHPLoader) {
21288
21503
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
21289
21504
  MainLoop.queue.push({
21290
21505
  func: () => {
21291
- ((a1) => {})(
21292
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21506
+ ((
21507
+ a1
21508
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21509
+ arg
21293
21510
  );
21294
21511
  },
21295
21512
  name: UTF8ToString(name),
@@ -21302,8 +21519,10 @@ export function init(RuntimeName, PHPLoader) {
21302
21519
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
21303
21520
  MainLoop.queue.push({
21304
21521
  func: () => {
21305
- ((a1) => {})(
21306
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21522
+ ((
21523
+ a1
21524
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21525
+ arg
21307
21526
  );
21308
21527
  },
21309
21528
  name: UTF8ToString(name),
@@ -21337,8 +21556,12 @@ export function init(RuntimeName, PHPLoader) {
21337
21556
  var resultPtr = stackAlloc(POINTER_SIZE);
21338
21557
  HEAPU32[resultPtr >> 2] = 0;
21339
21558
  try {
21340
- var result = ((a1, a2, a3) => {})(
21341
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
21559
+ var result = ((
21560
+ a1,
21561
+ a2,
21562
+ a3
21563
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21564
+ resultPtr,
21342
21565
  userData,
21343
21566
  value
21344
21567
  );
@@ -22175,15 +22398,19 @@ export function init(RuntimeName, PHPLoader) {
22175
22398
  () => {
22176
22399
  runtimeKeepalivePop();
22177
22400
  if (onload)
22178
- ((a1) => {})(
22179
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22401
+ ((
22402
+ a1
22403
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22404
+ file
22180
22405
  );
22181
22406
  },
22182
22407
  () => {
22183
22408
  runtimeKeepalivePop();
22184
22409
  if (onerror)
22185
- ((a1) => {})(
22186
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22410
+ ((
22411
+ a1
22412
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22413
+ file
22187
22414
  );
22188
22415
  },
22189
22416
  true // don'tCreateFile - it's already there
@@ -22217,16 +22444,21 @@ export function init(RuntimeName, PHPLoader) {
22217
22444
  () => {
22218
22445
  runtimeKeepalivePop();
22219
22446
  if (onload)
22220
- ((a1, a2) => {})(
22221
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
22447
+ ((
22448
+ a1,
22449
+ a2
22450
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22451
+ arg,
22222
22452
  cname
22223
22453
  );
22224
22454
  },
22225
22455
  () => {
22226
22456
  runtimeKeepalivePop();
22227
22457
  if (onerror)
22228
- ((a1) => {})(
22229
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22458
+ ((
22459
+ a1
22460
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22461
+ arg
22230
22462
  );
22231
22463
  },
22232
22464
  true // don'tCreateFile - it's already there
@@ -22494,10 +22726,10 @@ export function init(RuntimeName, PHPLoader) {
22494
22726
  runtimeKeepalivePop();
22495
22727
  callUserCallback(() =>
22496
22728
  withStackSave(() =>
22497
- ((a1) => {})(
22498
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
22499
- _file
22500
- )
22729
+ ((
22730
+ a1
22731
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22732
+ stringToUTF8OnStack(_file)
22501
22733
  )
22502
22734
  )
22503
22735
  );
@@ -22541,8 +22773,12 @@ export function init(RuntimeName, PHPLoader) {
22541
22773
  callUserCallback(() => {
22542
22774
  var buffer = _malloc(byteArray.length);
22543
22775
  HEAPU8.set(byteArray, buffer);
22544
- ((a1, a2, a3) => {})(
22545
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
22776
+ ((
22777
+ a1,
22778
+ a2,
22779
+ a3
22780
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22781
+ userdata,
22546
22782
  buffer,
22547
22783
  byteArray.length
22548
22784
  );
@@ -22552,8 +22788,10 @@ export function init(RuntimeName, PHPLoader) {
22552
22788
  if (onerror) {
22553
22789
  runtimeKeepalivePop();
22554
22790
  callUserCallback(() => {
22555
- ((a1) => {})(
22556
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
22791
+ ((
22792
+ a1
22793
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22794
+ userdata
22557
22795
  );
22558
22796
  });
22559
22797
  }
@@ -22609,8 +22847,12 @@ export function init(RuntimeName, PHPLoader) {
22609
22847
  );
22610
22848
  if (onload) {
22611
22849
  var sp = stackSave();
22612
- ((a1, a2, a3) => {})(
22613
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22850
+ ((
22851
+ a1,
22852
+ a2,
22853
+ a3
22854
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22855
+ handle,
22614
22856
  userdata,
22615
22857
  stringToUTF8OnStack(_file)
22616
22858
  );
@@ -22618,8 +22860,12 @@ export function init(RuntimeName, PHPLoader) {
22618
22860
  }
22619
22861
  } else {
22620
22862
  if (onerror)
22621
- ((a1, a2, a3) => {})(
22622
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22863
+ ((
22864
+ a1,
22865
+ a2,
22866
+ a3
22867
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22868
+ handle,
22623
22869
  userdata,
22624
22870
  http.status
22625
22871
  );
@@ -22632,8 +22878,12 @@ export function init(RuntimeName, PHPLoader) {
22632
22878
  http.onerror = (e) => {
22633
22879
  runtimeKeepalivePop();
22634
22880
  if (onerror)
22635
- ((a1, a2, a3) => {})(
22636
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22881
+ ((
22882
+ a1,
22883
+ a2,
22884
+ a3
22885
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22886
+ handle,
22637
22887
  userdata,
22638
22888
  http.status
22639
22889
  );
@@ -22648,8 +22898,12 @@ export function init(RuntimeName, PHPLoader) {
22648
22898
  ) {
22649
22899
  var percentComplete = (e.loaded / e.total) * 100;
22650
22900
  if (onprogress)
22651
- ((a1, a2, a3) => {})(
22652
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22901
+ ((
22902
+ a1,
22903
+ a2,
22904
+ a3
22905
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22906
+ handle,
22653
22907
  userdata,
22654
22908
  percentComplete
22655
22909
  );
@@ -22706,8 +22960,13 @@ export function init(RuntimeName, PHPLoader) {
22706
22960
  if (http.statusText) {
22707
22961
  statusText = stringToUTF8OnStack(http.statusText);
22708
22962
  }
22709
- ((a1, a2, a3, a4) => {})(
22710
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22963
+ ((
22964
+ a1,
22965
+ a2,
22966
+ a3,
22967
+ a4
22968
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22969
+ handle,
22711
22970
  userdata,
22712
22971
  http.status,
22713
22972
  statusText
@@ -22728,8 +22987,13 @@ export function init(RuntimeName, PHPLoader) {
22728
22987
  var buffer = _malloc(byteArray.length);
22729
22988
  HEAPU8.set(byteArray, buffer);
22730
22989
  if (onload)
22731
- ((a1, a2, a3, a4) => {})(
22732
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22990
+ ((
22991
+ a1,
22992
+ a2,
22993
+ a3,
22994
+ a4
22995
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22996
+ handle,
22733
22997
  userdata,
22734
22998
  buffer,
22735
22999
  byteArray.length
@@ -22750,8 +23014,13 @@ export function init(RuntimeName, PHPLoader) {
22750
23014
  // PROGRESS
22751
23015
  http.onprogress = (e) => {
22752
23016
  if (onprogress)
22753
- ((a1, a2, a3, a4) => {})(
22754
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23017
+ ((
23018
+ a1,
23019
+ a2,
23020
+ a3,
23021
+ a4
23022
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23023
+ handle,
22755
23024
  userdata,
22756
23025
  e.loaded,
22757
23026
  e.lengthComputable || e.lengthComputable === undefined
@@ -23082,16 +23351,24 @@ export function init(RuntimeName, PHPLoader) {
23082
23351
  if (event === 'error') {
23083
23352
  withStackSave(() => {
23084
23353
  var msg = stringToUTF8OnStack(data[2]);
23085
- ((a1, a2, a3, a4) => {})(
23086
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
23354
+ ((
23355
+ a1,
23356
+ a2,
23357
+ a3,
23358
+ a4
23359
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23360
+ data[0],
23087
23361
  data[1],
23088
23362
  msg,
23089
23363
  userData
23090
23364
  );
23091
23365
  });
23092
23366
  } else {
23093
- ((a1, a2) => {})(
23094
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
23367
+ ((
23368
+ a1,
23369
+ a2
23370
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23371
+ data,
23095
23372
  userData
23096
23373
  );
23097
23374
  }
@@ -24044,8 +24321,12 @@ export function init(RuntimeName, PHPLoader) {
24044
24321
  ) => {
24045
24322
  var webGlEventHandlerFunc = (e = event) => {
24046
24323
  if (
24047
- ((a1, a2, a3) => {})(
24048
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
24324
+ ((
24325
+ a1,
24326
+ a2,
24327
+ a3
24328
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24329
+ eventTypeId,
24049
24330
  0,
24050
24331
  userData
24051
24332
  )
@@ -24264,15 +24545,21 @@ export function init(RuntimeName, PHPLoader) {
24264
24545
  ) {
24265
24546
  event.preventDefault();
24266
24547
  GLUT.saveModifiers(event);
24267
- ((a1, a2) => {})(
24268
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
24548
+ ((
24549
+ a1,
24550
+ a2
24551
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24552
+ lastX,
24269
24553
  lastY
24270
24554
  );
24271
24555
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
24272
24556
  event.preventDefault();
24273
24557
  GLUT.saveModifiers(event);
24274
- ((a1, a2) => {})(
24275
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
24558
+ ((
24559
+ a1,
24560
+ a2
24561
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24562
+ lastX,
24276
24563
  lastY
24277
24564
  );
24278
24565
  }
@@ -24433,8 +24720,12 @@ export function init(RuntimeName, PHPLoader) {
24433
24720
  if (GLUT.specialFunc) {
24434
24721
  event.preventDefault();
24435
24722
  GLUT.saveModifiers(event);
24436
- ((a1, a2, a3) => {})(
24437
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24723
+ ((
24724
+ a1,
24725
+ a2,
24726
+ a3
24727
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24728
+ key,
24438
24729
  Browser.mouseX,
24439
24730
  Browser.mouseY
24440
24731
  );
@@ -24444,8 +24735,12 @@ export function init(RuntimeName, PHPLoader) {
24444
24735
  if (key !== null && GLUT.keyboardFunc) {
24445
24736
  event.preventDefault();
24446
24737
  GLUT.saveModifiers(event);
24447
- ((a1, a2, a3) => {})(
24448
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24738
+ ((
24739
+ a1,
24740
+ a2,
24741
+ a3
24742
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24743
+ key,
24449
24744
  Browser.mouseX,
24450
24745
  Browser.mouseY
24451
24746
  );
@@ -24460,8 +24755,12 @@ export function init(RuntimeName, PHPLoader) {
24460
24755
  if (GLUT.specialUpFunc) {
24461
24756
  event.preventDefault();
24462
24757
  GLUT.saveModifiers(event);
24463
- ((a1, a2, a3) => {})(
24464
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24758
+ ((
24759
+ a1,
24760
+ a2,
24761
+ a3
24762
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24763
+ key,
24465
24764
  Browser.mouseX,
24466
24765
  Browser.mouseY
24467
24766
  );
@@ -24471,8 +24770,12 @@ export function init(RuntimeName, PHPLoader) {
24471
24770
  if (key !== null && GLUT.keyboardUpFunc) {
24472
24771
  event.preventDefault();
24473
24772
  GLUT.saveModifiers(event);
24474
- ((a1, a2, a3) => {})(
24475
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24773
+ ((
24774
+ a1,
24775
+ a2,
24776
+ a3
24777
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24778
+ key,
24476
24779
  Browser.mouseX,
24477
24780
  Browser.mouseY
24478
24781
  );
@@ -24536,10 +24839,13 @@ export function init(RuntimeName, PHPLoader) {
24536
24839
  } catch (e) {}
24537
24840
  event.preventDefault();
24538
24841
  GLUT.saveModifiers(event);
24539
- ((a1, a2, a3, a4) => {})(
24540
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
24541
- 'button'
24542
- ],
24842
+ ((
24843
+ a1,
24844
+ a2,
24845
+ a3,
24846
+ a4
24847
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24848
+ event['button'],
24543
24849
  0 /*GLUT_DOWN*/,
24544
24850
  Browser.mouseX,
24545
24851
  Browser.mouseY
@@ -24554,10 +24860,13 @@ export function init(RuntimeName, PHPLoader) {
24554
24860
  if (GLUT.mouseFunc) {
24555
24861
  event.preventDefault();
24556
24862
  GLUT.saveModifiers(event);
24557
- ((a1, a2, a3, a4) => {})(
24558
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
24559
- 'button'
24560
- ],
24863
+ ((
24864
+ a1,
24865
+ a2,
24866
+ a3,
24867
+ a4
24868
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24869
+ event['button'],
24561
24870
  1 /*GLUT_UP*/,
24562
24871
  Browser.mouseX,
24563
24872
  Browser.mouseY
@@ -24586,8 +24895,13 @@ export function init(RuntimeName, PHPLoader) {
24586
24895
  if (GLUT.mouseFunc) {
24587
24896
  event.preventDefault();
24588
24897
  GLUT.saveModifiers(event);
24589
- ((a1, a2, a3, a4) => {})(
24590
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
24898
+ ((
24899
+ a1,
24900
+ a2,
24901
+ a3,
24902
+ a4
24903
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24904
+ button,
24591
24905
  0 /*GLUT_DOWN*/,
24592
24906
  Browser.mouseX,
24593
24907
  Browser.mouseY
@@ -24625,8 +24939,11 @@ export function init(RuntimeName, PHPLoader) {
24625
24939
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
24626
24940
  if (GLUT.reshapeFunc) {
24627
24941
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
24628
- ((a1, a2) => {})(
24629
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
24942
+ ((
24943
+ a1,
24944
+ a2
24945
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24946
+ width,
24630
24947
  height
24631
24948
  );
24632
24949
  }
@@ -24682,8 +24999,11 @@ export function init(RuntimeName, PHPLoader) {
24682
24999
  // Resize callback stage 2: updateResizeListeners notifies reshapeFunc
24683
25000
  Browser.resizeListeners.push((width, height) => {
24684
25001
  if (GLUT.reshapeFunc) {
24685
- ((a1, a2) => {})(
24686
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25002
+ ((
25003
+ a1,
25004
+ a2
25005
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25006
+ width,
24687
25007
  height
24688
25008
  );
24689
25009
  }
@@ -24798,8 +25118,10 @@ export function init(RuntimeName, PHPLoader) {
24798
25118
  var _glutTimerFunc = (msec, func, value) =>
24799
25119
  safeSetTimeout(
24800
25120
  () =>
24801
- ((a1) => {})(
24802
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25121
+ ((
25122
+ a1
25123
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25124
+ value
24803
25125
  ),
24804
25126
  msec
24805
25127
  );
@@ -24959,8 +25281,11 @@ export function init(RuntimeName, PHPLoader) {
24959
25281
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
24960
25282
  // Just call it once here.
24961
25283
  if (GLUT.reshapeFunc) {
24962
- ((a1, a2) => {})(
24963
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25284
+ ((
25285
+ a1,
25286
+ a2
25287
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25288
+ width,
24964
25289
  height
24965
25290
  );
24966
25291
  }
@@ -26014,15 +26339,21 @@ export function init(RuntimeName, PHPLoader) {
26014
26339
  callUserCallback(() => {
26015
26340
  if (error) {
26016
26341
  if (onerror)
26017
- ((a1) => {})(
26018
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26342
+ ((
26343
+ a1
26344
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26345
+ arg
26019
26346
  );
26020
26347
  return;
26021
26348
  }
26022
26349
  var buffer = _malloc(byteArray.length);
26023
26350
  HEAPU8.set(byteArray, buffer);
26024
- ((a1, a2, a3) => {})(
26025
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26351
+ ((
26352
+ a1,
26353
+ a2,
26354
+ a3
26355
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26356
+ arg,
26026
26357
  buffer,
26027
26358
  byteArray.length
26028
26359
  );
@@ -26054,14 +26385,18 @@ export function init(RuntimeName, PHPLoader) {
26054
26385
  callUserCallback(() => {
26055
26386
  if (error) {
26056
26387
  if (onerror)
26057
- ((a1) => {})(
26058
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26388
+ ((
26389
+ a1
26390
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26391
+ arg
26059
26392
  );
26060
26393
  return;
26061
26394
  }
26062
26395
  if (onstore)
26063
- ((a1) => {})(
26064
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26396
+ ((
26397
+ a1
26398
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26399
+ arg
26065
26400
  );
26066
26401
  });
26067
26402
  }
@@ -26076,14 +26411,18 @@ export function init(RuntimeName, PHPLoader) {
26076
26411
  callUserCallback(() => {
26077
26412
  if (error) {
26078
26413
  if (onerror)
26079
- ((a1) => {})(
26080
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26414
+ ((
26415
+ a1
26416
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26417
+ arg
26081
26418
  );
26082
26419
  return;
26083
26420
  }
26084
26421
  if (ondelete)
26085
- ((a1) => {})(
26086
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26422
+ ((
26423
+ a1
26424
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26425
+ arg
26087
26426
  );
26088
26427
  });
26089
26428
  });
@@ -26100,14 +26439,19 @@ export function init(RuntimeName, PHPLoader) {
26100
26439
  callUserCallback(() => {
26101
26440
  if (error) {
26102
26441
  if (onerror)
26103
- ((a1) => {})(
26104
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26442
+ ((
26443
+ a1
26444
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26445
+ arg
26105
26446
  );
26106
26447
  return;
26107
26448
  }
26108
26449
  if (oncheck)
26109
- ((a1, a2) => {})(
26110
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26450
+ ((
26451
+ a1,
26452
+ a2
26453
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26454
+ arg,
26111
26455
  exists
26112
26456
  );
26113
26457
  });
@@ -26123,14 +26467,18 @@ export function init(RuntimeName, PHPLoader) {
26123
26467
  callUserCallback(() => {
26124
26468
  if (error) {
26125
26469
  if (onerror)
26126
- ((a1) => {})(
26127
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26470
+ ((
26471
+ a1
26472
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26473
+ arg
26128
26474
  );
26129
26475
  return;
26130
26476
  }
26131
26477
  if (onclear)
26132
- ((a1) => {})(
26133
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26478
+ ((
26479
+ a1
26480
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26481
+ arg
26134
26482
  );
26135
26483
  });
26136
26484
  });
@@ -26287,8 +26635,11 @@ export function init(RuntimeName, PHPLoader) {
26287
26635
  safeSetTimeout(() => {
26288
26636
  var stackBegin = Asyncify.currData + 12;
26289
26637
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
26290
- ((a1, a2) => {})(
26291
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
26638
+ ((
26639
+ a1,
26640
+ a2
26641
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26642
+ stackBegin,
26292
26643
  stackEnd
26293
26644
  );
26294
26645
  wakeUp();
@@ -26337,8 +26688,10 @@ export function init(RuntimeName, PHPLoader) {
26337
26688
  HEAPU32[(newFiber + 12) >> 2] = 0;
26338
26689
 
26339
26690
  var userData = HEAPU32[(newFiber + 16) >> 2];
26340
- ((a1) => {})(
26341
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
26691
+ ((
26692
+ a1
26693
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26694
+ userData
26342
26695
  );
26343
26696
  } else {
26344
26697
  var asyncifyData = newFiber + 20;
@@ -27349,8 +27702,11 @@ export function init(RuntimeName, PHPLoader) {
27349
27702
  if (!SDL.eventHandler) return;
27350
27703
 
27351
27704
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
27352
- ((a1, a2) => {})(
27353
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
27705
+ ((
27706
+ a1,
27707
+ a2
27708
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27709
+ SDL.eventHandlerContext,
27354
27710
  SDL.eventHandlerTemp
27355
27711
  );
27356
27712
  }
@@ -28974,9 +29330,12 @@ export function init(RuntimeName, PHPLoader) {
28974
29330
  return;
28975
29331
 
28976
29332
  // Ask SDL audio data from the user code.
28977
- ((a1, a2, a3) => {})(
28978
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
28979
- .audio.userdata,
29333
+ ((
29334
+ a1,
29335
+ a2,
29336
+ a3
29337
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29338
+ SDL.audio.userdata,
28980
29339
  SDL.audio.buffer,
28981
29340
  SDL.audio.bufferSize
28982
29341
  );
@@ -29434,8 +29793,10 @@ export function init(RuntimeName, PHPLoader) {
29434
29793
  info.audio = null;
29435
29794
  }
29436
29795
  if (SDL.channelFinished) {
29437
- ((a1) => {})(
29438
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
29796
+ ((
29797
+ a1
29798
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29799
+ channel
29439
29800
  );
29440
29801
  }
29441
29802
  }
@@ -29503,8 +29864,10 @@ export function init(RuntimeName, PHPLoader) {
29503
29864
  channelInfo.audio = null;
29504
29865
  }
29505
29866
  if (SDL.channelFinished)
29506
- ((a1) => {})(
29507
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
29867
+ ((
29868
+ a1
29869
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29870
+ channel
29508
29871
  );
29509
29872
  };
29510
29873
  if (channelInfo.audio) {
@@ -30239,8 +30602,11 @@ export function init(RuntimeName, PHPLoader) {
30239
30602
  var _SDL_AddTimer = (interval, callback, param) =>
30240
30603
  safeSetTimeout(
30241
30604
  () =>
30242
- ((a1, a2) => {})(
30243
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
30605
+ ((
30606
+ a1,
30607
+ a2
30608
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30609
+ interval,
30244
30610
  param
30245
30611
  ),
30246
30612
  interval
@@ -30473,26 +30839,6 @@ export function init(RuntimeName, PHPLoader) {
30473
30839
  });
30474
30840
  };
30475
30841
 
30476
- function _recv(sockfd, buffer, size, flags) {
30477
- return _wasm_recv(sockfd, buffer, size, flags);
30478
- }
30479
-
30480
- function _setsockopt(
30481
- socketd,
30482
- level,
30483
- optionName,
30484
- optionValuePtr,
30485
- optionLen
30486
- ) {
30487
- return _wasm_setsockopt(
30488
- socketd,
30489
- level,
30490
- optionName,
30491
- optionValuePtr,
30492
- optionLen
30493
- );
30494
- }
30495
-
30496
30842
  var _getdtablesize = () => abort('missing function: ${name}');
30497
30843
 
30498
30844
  function ___emscripten_lookup_name(namePtr) {
@@ -30656,8 +31002,12 @@ export function init(RuntimeName, PHPLoader) {
30656
31002
 
30657
31003
  socket.onopen = function (e) {
30658
31004
  var eventPtr = WS.getSocketEvent(socketId);
30659
- ((a1, a2, a3) => {})(
30660
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31005
+ ((
31006
+ a1,
31007
+ a2,
31008
+ a3
31009
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31010
+ 0 /*TODO*/,
30661
31011
  eventPtr,
30662
31012
  userData
30663
31013
  );
@@ -30679,8 +31029,12 @@ export function init(RuntimeName, PHPLoader) {
30679
31029
 
30680
31030
  socket.onerror = function (e) {
30681
31031
  var eventPtr = WS.getSocketEvent(socketId);
30682
- ((a1, a2, a3) => {})(
30683
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31032
+ ((
31033
+ a1,
31034
+ a2,
31035
+ a3
31036
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31037
+ 0 /*TODO*/,
30684
31038
  eventPtr,
30685
31039
  userData
30686
31040
  );
@@ -30705,8 +31059,12 @@ export function init(RuntimeName, PHPLoader) {
30705
31059
  ((HEAP8[eventPtr + 4] = e.wasClean),
30706
31060
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
30707
31061
  stringToUTF8(e.reason, eventPtr + 8, 512));
30708
- ((a1, a2, a3) => {})(
30709
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31062
+ ((
31063
+ a1,
31064
+ a2,
31065
+ a3
31066
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31067
+ 0 /*TODO*/,
30710
31068
  eventPtr,
30711
31069
  userData
30712
31070
  );
@@ -30740,8 +31098,12 @@ export function init(RuntimeName, PHPLoader) {
30740
31098
  ((HEAPU32[(eventPtr + 4) >> 2] = buf),
30741
31099
  (HEAP32[(eventPtr + 8) >> 2] = len),
30742
31100
  (HEAP8[eventPtr + 12] = isText),
30743
- ((a1, a2, a3) => {})(
30744
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31101
+ ((
31102
+ a1,
31103
+ a2,
31104
+ a3
31105
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31106
+ 0 /*TODO*/,
30745
31107
  eventPtr,
30746
31108
  userData
30747
31109
  ));
@@ -30985,8 +31347,6 @@ export function init(RuntimeName, PHPLoader) {
30985
31347
  Module['___cxa_rethrow_primary_exception'] =
30986
31348
  ___cxa_rethrow_primary_exception;
30987
31349
  Module['___syscall_shutdown'] = ___syscall_shutdown;
30988
- Module['_recv'] = _recv;
30989
- Module['_setsockopt'] = _setsockopt;
30990
31350
  // End JS library exports
30991
31351
 
30992
31352
  // end include: postlibrary.js
@@ -31373,7 +31733,7 @@ export function init(RuntimeName, PHPLoader) {
31373
31733
  wasmMemory;
31374
31734
 
31375
31735
  function assignWasmExports(wasmExports) {
31376
- _free = PHPLoader['free'] = wasmExports['free'];
31736
+ _free = wasmExports['free'];
31377
31737
  _memcmp = wasmExports['memcmp'];
31378
31738
  _malloc =
31379
31739
  PHPLoader['malloc'] =
@@ -31441,7 +31801,10 @@ export function init(RuntimeName, PHPLoader) {
31441
31801
  wasmExports['wasm_sapi_handle_request'];
31442
31802
  _php_wasm_init = Module['_php_wasm_init'] =
31443
31803
  wasmExports['php_wasm_init'];
31444
- _wasm_free = Module['_wasm_free'] = wasmExports['wasm_free'];
31804
+ _wasm_free =
31805
+ PHPLoader['free'] =
31806
+ Module['_wasm_free'] =
31807
+ wasmExports['wasm_free'];
31445
31808
  _wasm_get_end_offset = Module['_wasm_get_end_offset'] =
31446
31809
  wasmExports['wasm_get_end_offset'];
31447
31810
  ___wrap_getpid = Module['___wrap_getpid'] =
@@ -34087,12 +34450,8 @@ export function init(RuntimeName, PHPLoader) {
34087
34450
  wasm_poll_socket,
34088
34451
  /** @export */
34089
34452
  wasm_recv: _wasm_recv,
34090
- /** */
34091
- recv: _recv,
34092
34453
  /** @export */
34093
34454
  wasm_setsockopt: _wasm_setsockopt,
34094
- /** */
34095
- setsockopt: _setsockopt,
34096
34455
  /** @export */
34097
34456
  wasm_shutdown: _wasm_shutdown,
34098
34457
  /** @export */