@php-wasm/node-8-2 3.1.2 → 3.1.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -15,7 +15,7 @@ const currentDirPath =
15
15
  : path.dirname(fileURLToPath(import.meta.url));
16
16
  const dependencyFilename = path.join(currentDirPath, '8_2_30', 'php_8_2.wasm');
17
17
  export { dependencyFilename };
18
- export const dependenciesTotalSize = 27520158;
18
+ export const dependenciesTotalSize = 27535196;
19
19
  const phpVersionString = '8.2.30';
20
20
  export function init(RuntimeName, PHPLoader) {
21
21
  // The rest of the code comes from the built php.js file and esm-suffix.js
@@ -5125,8 +5125,10 @@ export function init(RuntimeName, PHPLoader) {
5125
5125
  );
5126
5126
 
5127
5127
  var ___call_sighandler = (fp, sig) =>
5128
- ((a1) => {})(
5129
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
5128
+ ((
5129
+ a1
5130
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
5131
+ sig
5130
5132
  );
5131
5133
  ___call_sighandler.sig = 'vpi';
5132
5134
 
@@ -6539,6 +6541,9 @@ export function init(RuntimeName, PHPLoader) {
6539
6541
 
6540
6542
  var allocateUTF8OnStack = (...args) => stringToUTF8OnStack(...args);
6541
6543
 
6544
+ var onInits = [];
6545
+ var addOnInit = (cb) => onInits.push(cb);
6546
+
6542
6547
  function _js_getpid() {
6543
6548
  return PHPLoader.processId ?? 42;
6544
6549
  }
@@ -6562,10 +6567,13 @@ export function init(RuntimeName, PHPLoader) {
6562
6567
  * are not yet assigned.
6563
6568
  */
6564
6569
  addOnInit(() => {
6570
+ if (typeof PHPLoader.processId !== 'number') {
6571
+ throw new Error(
6572
+ 'PHPLoader.processId must be set before init'
6573
+ );
6574
+ }
6565
6575
  Module['userSpace'] = PHPLoader.bindUserSpace({
6566
- // TODO: Require PID instead of defaulting to 42.
6567
- pid: PHPLoader.processId ?? 42,
6568
- // TODO: When receiving this context, validate that all these fields exist.
6576
+ pid: PHPLoader.processId,
6569
6577
  constants: {
6570
6578
  F_GETFL: Number('3'),
6571
6579
  O_ACCMODE: Number('2097155'),
@@ -6606,19 +6614,107 @@ export function init(RuntimeName, PHPLoader) {
6606
6614
  LOCK_UN: 8, // Unlock
6607
6615
  },
6608
6616
  errnoCodes: ERRNO_CODES,
6617
+ // Use get/set closures instead of exposing
6618
+ // typed arrays directly. After memory.grow(),
6619
+ // Emscripten's updateMemoryViews() reassigns
6620
+ // the module-scoped HEAP* variables. Closures
6621
+ // always reference the current value, so
6622
+ // accesses are never stale. The get/set
6623
+ // interface also prevents callers from
6624
+ // capturing a typed array reference that
6625
+ // could become stale.
6609
6626
  memory: {
6610
- HEAP8,
6611
- HEAPU8,
6612
- HEAP16,
6613
- HEAPU16,
6614
- HEAP32,
6615
- HEAPU32,
6616
- HEAPF32,
6617
- HEAP64,
6618
- HEAPU64,
6619
- HEAPF64,
6627
+ HEAP8: {
6628
+ get(offset) {
6629
+ return HEAP8[offset];
6630
+ },
6631
+ set(offset, value) {
6632
+ HEAP8[offset] = value;
6633
+ },
6634
+ },
6635
+ HEAPU8: {
6636
+ get(offset) {
6637
+ return HEAPU8[offset];
6638
+ },
6639
+ set(offset, value) {
6640
+ HEAPU8[offset] = value;
6641
+ },
6642
+ },
6643
+ HEAP16: {
6644
+ get(offset) {
6645
+ return HEAP16[offset];
6646
+ },
6647
+ set(offset, value) {
6648
+ HEAP16[offset] = value;
6649
+ },
6650
+ },
6651
+ HEAPU16: {
6652
+ get(offset) {
6653
+ return HEAPU16[offset];
6654
+ },
6655
+ set(offset, value) {
6656
+ HEAPU16[offset] = value;
6657
+ },
6658
+ },
6659
+ HEAP32: {
6660
+ get(offset) {
6661
+ return HEAP32[offset];
6662
+ },
6663
+ set(offset, value) {
6664
+ HEAP32[offset] = value;
6665
+ },
6666
+ },
6667
+ HEAPU32: {
6668
+ get(offset) {
6669
+ return HEAPU32[offset];
6670
+ },
6671
+ set(offset, value) {
6672
+ HEAPU32[offset] = value;
6673
+ },
6674
+ },
6675
+ HEAPF32: {
6676
+ get(offset) {
6677
+ return HEAPF32[offset];
6678
+ },
6679
+ set(offset, value) {
6680
+ HEAPF32[offset] = value;
6681
+ },
6682
+ },
6683
+ HEAP64: {
6684
+ get(offset) {
6685
+ return HEAP64[offset];
6686
+ },
6687
+ set(offset, value) {
6688
+ HEAP64[offset] = value;
6689
+ },
6690
+ },
6691
+ HEAPU64: {
6692
+ get(offset) {
6693
+ return HEAPU64[offset];
6694
+ },
6695
+ set(offset, value) {
6696
+ HEAPU64[offset] = value;
6697
+ },
6698
+ },
6699
+ HEAPF64: {
6700
+ get(offset) {
6701
+ return HEAPF64[offset];
6702
+ },
6703
+ set(offset, value) {
6704
+ HEAPF64[offset] = value;
6705
+ },
6706
+ },
6620
6707
  },
6621
- wasmImports,
6708
+ wasmImports: Object.assign(
6709
+ {},
6710
+ wasmImports,
6711
+ typeof _builtin_fd_close === 'function'
6712
+ ? { builtin_fd_close: _builtin_fd_close }
6713
+ : {},
6714
+ typeof _builtin_fcntl64 === 'function'
6715
+ ? { builtin_fcntl64: _builtin_fcntl64 }
6716
+ : {}
6717
+ ),
6622
6718
  wasmExports,
6623
6719
  syscalls: SYSCALLS,
6624
6720
  FS,
@@ -8503,8 +8599,11 @@ export function init(RuntimeName, PHPLoader) {
8503
8599
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8504
8600
  runtimeKeepalivePop();
8505
8601
  callUserCallback(() =>
8506
- ((a1, a2) => {})(
8507
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8602
+ ((
8603
+ a1,
8604
+ a2
8605
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8606
+ handle,
8508
8607
  user_data
8509
8608
  )
8510
8609
  );
@@ -8512,8 +8611,11 @@ export function init(RuntimeName, PHPLoader) {
8512
8611
  function successCallback() {
8513
8612
  runtimeKeepalivePop();
8514
8613
  callUserCallback(() =>
8515
- ((a1, a2) => {})(
8516
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8614
+ ((
8615
+ a1,
8616
+ a2
8617
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8618
+ handle,
8517
8619
  user_data
8518
8620
  )
8519
8621
  );
@@ -17037,9 +17139,9 @@ export function init(RuntimeName, PHPLoader) {
17037
17139
  if (!cp.stdin.closed) {
17038
17140
  cp.stdin.end();
17039
17141
  }
17040
- _free(buffer);
17041
- _free(iov);
17042
- _free(pnum);
17142
+ _wasm_free(buffer);
17143
+ _wasm_free(iov);
17144
+ _wasm_free(pnum);
17043
17145
  }
17044
17146
 
17045
17147
  // pump() can never alter the result of this function.
@@ -17766,7 +17868,17 @@ export function init(RuntimeName, PHPLoader) {
17766
17868
  // A true async operation was begun; start a sleep.
17767
17869
  Asyncify.state = Asyncify.State.Unwinding;
17768
17870
  // TODO: reuse, don't alloc/free every sleep
17769
- Asyncify.currData = Asyncify.allocateData();
17871
+ if (!Asyncify._cachedData) {
17872
+ Asyncify._cachedData = Asyncify.allocateData();
17873
+ } else {
17874
+ Asyncify.setDataHeader(
17875
+ Asyncify._cachedData,
17876
+ Asyncify._cachedData + 12,
17877
+ Asyncify.StackSize
17878
+ );
17879
+ Asyncify.setDataRewindFunc(Asyncify._cachedData);
17880
+ }
17881
+ Asyncify.currData = Asyncify._cachedData;
17770
17882
  if (typeof MainLoop != 'undefined' && MainLoop.func) {
17771
17883
  MainLoop.pause();
17772
17884
  }
@@ -17778,7 +17890,6 @@ export function init(RuntimeName, PHPLoader) {
17778
17890
  // Stop a resume.
17779
17891
  Asyncify.state = Asyncify.State.Normal;
17780
17892
  runAndAbortIfError(_asyncify_stop_rewind);
17781
- _free(Asyncify.currData);
17782
17893
  Asyncify.currData = null;
17783
17894
  // Call all sleep callbacks now that the sleep-resume is all done.
17784
17895
  Asyncify.sleepCallbacks.forEach(callUserCallback);
@@ -18107,8 +18218,11 @@ export function init(RuntimeName, PHPLoader) {
18107
18218
  var trace = getCallstack();
18108
18219
  var parts = trace.split('\n');
18109
18220
  for (var i = 0; i < parts.length; i++) {
18110
- var ret = ((a1, a2) => {})(
18111
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
18221
+ var ret = ((
18222
+ a1,
18223
+ a2
18224
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18225
+ 0,
18112
18226
  arg
18113
18227
  );
18114
18228
  if (ret !== 0) return;
@@ -18212,10 +18326,6 @@ export function init(RuntimeName, PHPLoader) {
18212
18326
  };
18213
18327
  __emscripten_fs_load_embedded_files.sig = 'vp';
18214
18328
 
18215
- var onInits = [];
18216
-
18217
- var addOnInit = (cb) => onInits.push(cb);
18218
-
18219
18329
  var onMains = [];
18220
18330
 
18221
18331
  var addOnPreMain = (cb) => onMains.push(cb);
@@ -18652,8 +18762,12 @@ export function init(RuntimeName, PHPLoader) {
18652
18762
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
18653
18763
 
18654
18764
  if (
18655
- ((a1, a2, a3) => {})(
18656
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
18765
+ ((
18766
+ a1,
18767
+ a2,
18768
+ a3
18769
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18770
+ eventTypeId,
18657
18771
  keyEventData,
18658
18772
  userData
18659
18773
  )
@@ -18771,8 +18885,12 @@ export function init(RuntimeName, PHPLoader) {
18771
18885
  fillMouseEventData(JSEvents.mouseEvent, e, target);
18772
18886
 
18773
18887
  if (
18774
- ((a1, a2, a3) => {})(
18775
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
18888
+ ((
18889
+ a1,
18890
+ a2,
18891
+ a3
18892
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
18893
+ eventTypeId,
18776
18894
  JSEvents.mouseEvent,
18777
18895
  userData
18778
18896
  )
@@ -18986,8 +19104,12 @@ export function init(RuntimeName, PHPLoader) {
18986
19104
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
18987
19105
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
18988
19106
  if (
18989
- ((a1, a2, a3) => {})(
18990
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19107
+ ((
19108
+ a1,
19109
+ a2,
19110
+ a3
19111
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19112
+ eventTypeId,
18991
19113
  wheelEvent,
18992
19114
  userData
18993
19115
  )
@@ -19068,8 +19190,12 @@ export function init(RuntimeName, PHPLoader) {
19068
19190
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
19069
19191
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
19070
19192
  if (
19071
- ((a1, a2, a3) => {})(
19072
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19193
+ ((
19194
+ a1,
19195
+ a2,
19196
+ a3
19197
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19198
+ eventTypeId,
19073
19199
  uiEvent,
19074
19200
  userData
19075
19201
  )
@@ -19143,8 +19269,12 @@ export function init(RuntimeName, PHPLoader) {
19143
19269
  stringToUTF8(id, focusEvent + 128, 128);
19144
19270
 
19145
19271
  if (
19146
- ((a1, a2, a3) => {})(
19147
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19272
+ ((
19273
+ a1,
19274
+ a2,
19275
+ a3
19276
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19277
+ eventTypeId,
19148
19278
  focusEvent,
19149
19279
  userData
19150
19280
  )
@@ -19260,8 +19390,12 @@ export function init(RuntimeName, PHPLoader) {
19260
19390
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
19261
19391
 
19262
19392
  if (
19263
- ((a1, a2, a3) => {})(
19264
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19393
+ ((
19394
+ a1,
19395
+ a2,
19396
+ a3
19397
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19398
+ eventTypeId,
19265
19399
  JSEvents.deviceOrientationEvent,
19266
19400
  userData
19267
19401
  )
@@ -19345,8 +19479,12 @@ export function init(RuntimeName, PHPLoader) {
19345
19479
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
19346
19480
 
19347
19481
  if (
19348
- ((a1, a2, a3) => {})(
19349
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19482
+ ((
19483
+ a1,
19484
+ a2,
19485
+ a3
19486
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19487
+ eventTypeId,
19350
19488
  JSEvents.deviceMotionEvent,
19351
19489
  userData
19352
19490
  )
@@ -19453,8 +19591,12 @@ export function init(RuntimeName, PHPLoader) {
19453
19591
  fillOrientationChangeEventData(orientationChangeEvent);
19454
19592
 
19455
19593
  if (
19456
- ((a1, a2, a3) => {})(
19457
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19594
+ ((
19595
+ a1,
19596
+ a2,
19597
+ a3
19598
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19599
+ eventTypeId,
19458
19600
  orientationChangeEvent,
19459
19601
  userData
19460
19602
  )
@@ -19583,8 +19725,12 @@ export function init(RuntimeName, PHPLoader) {
19583
19725
  fillFullscreenChangeEventData(fullscreenChangeEvent);
19584
19726
 
19585
19727
  if (
19586
- ((a1, a2, a3) => {})(
19587
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
19728
+ ((
19729
+ a1,
19730
+ a2,
19731
+ a3
19732
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19733
+ eventTypeId,
19588
19734
  fullscreenChangeEvent,
19589
19735
  userData
19590
19736
  )
@@ -19729,8 +19875,12 @@ export function init(RuntimeName, PHPLoader) {
19729
19875
  );
19730
19876
 
19731
19877
  if (currentFullscreenStrategy.canvasResizedCallback) {
19732
- ((a1, a2, a3) => {})(
19733
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
19878
+ ((
19879
+ a1,
19880
+ a2,
19881
+ a3
19882
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19883
+ 37,
19734
19884
  0,
19735
19885
  currentFullscreenStrategy.canvasResizedCallbackUserData
19736
19886
  );
@@ -19831,8 +19981,12 @@ export function init(RuntimeName, PHPLoader) {
19831
19981
  currentFullscreenStrategy = strategy;
19832
19982
 
19833
19983
  if (strategy.canvasResizedCallback) {
19834
- ((a1, a2, a3) => {})(
19835
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
19984
+ ((
19985
+ a1,
19986
+ a2,
19987
+ a3
19988
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19989
+ 37,
19836
19990
  0,
19837
19991
  strategy.canvasResizedCallbackUserData
19838
19992
  );
@@ -19932,8 +20086,12 @@ export function init(RuntimeName, PHPLoader) {
19932
20086
  !inCenteredWithoutScalingFullscreenMode &&
19933
20087
  currentFullscreenStrategy.canvasResizedCallback
19934
20088
  ) {
19935
- ((a1, a2, a3) => {})(
19936
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20089
+ ((
20090
+ a1,
20091
+ a2,
20092
+ a3
20093
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20094
+ 37,
19937
20095
  0,
19938
20096
  currentFullscreenStrategy.canvasResizedCallbackUserData
19939
20097
  );
@@ -20032,8 +20190,12 @@ export function init(RuntimeName, PHPLoader) {
20032
20190
  softFullscreenResizeWebGLRenderTarget
20033
20191
  );
20034
20192
  if (strategy.canvasResizedCallback) {
20035
- ((a1, a2, a3) => {})(
20036
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20193
+ ((
20194
+ a1,
20195
+ a2,
20196
+ a3
20197
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20198
+ 37,
20037
20199
  0,
20038
20200
  strategy.canvasResizedCallbackUserData
20039
20201
  );
@@ -20046,8 +20208,12 @@ export function init(RuntimeName, PHPLoader) {
20046
20208
 
20047
20209
  // Inform the caller that the canvas size has changed.
20048
20210
  if (strategy.canvasResizedCallback) {
20049
- ((a1, a2, a3) => {})(
20050
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
20211
+ ((
20212
+ a1,
20213
+ a2,
20214
+ a3
20215
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20216
+ 37,
20051
20217
  0,
20052
20218
  strategy.canvasResizedCallbackUserData
20053
20219
  );
@@ -20109,8 +20275,12 @@ export function init(RuntimeName, PHPLoader) {
20109
20275
  fillPointerlockChangeEventData(pointerlockChangeEvent);
20110
20276
 
20111
20277
  if (
20112
- ((a1, a2, a3) => {})(
20113
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20278
+ ((
20279
+ a1,
20280
+ a2,
20281
+ a3
20282
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20283
+ eventTypeId,
20114
20284
  pointerlockChangeEvent,
20115
20285
  userData
20116
20286
  )
@@ -20164,8 +20334,12 @@ export function init(RuntimeName, PHPLoader) {
20164
20334
  ) => {
20165
20335
  var pointerlockErrorEventHandlerFunc = (e = event) => {
20166
20336
  if (
20167
- ((a1, a2, a3) => {})(
20168
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20337
+ ((
20338
+ a1,
20339
+ a2,
20340
+ a3
20341
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20342
+ eventTypeId,
20169
20343
  0,
20170
20344
  userData
20171
20345
  )
@@ -20319,8 +20493,12 @@ export function init(RuntimeName, PHPLoader) {
20319
20493
  fillVisibilityChangeEventData(visibilityChangeEvent);
20320
20494
 
20321
20495
  if (
20322
- ((a1, a2, a3) => {})(
20323
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20496
+ ((
20497
+ a1,
20498
+ a2,
20499
+ a3
20500
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20501
+ eventTypeId,
20324
20502
  visibilityChangeEvent,
20325
20503
  userData
20326
20504
  )
@@ -20440,8 +20618,12 @@ export function init(RuntimeName, PHPLoader) {
20440
20618
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
20441
20619
 
20442
20620
  if (
20443
- ((a1, a2, a3) => {})(
20444
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20621
+ ((
20622
+ a1,
20623
+ a2,
20624
+ a3
20625
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20626
+ eventTypeId,
20445
20627
  touchEvent,
20446
20628
  userData
20447
20629
  )
@@ -20579,8 +20761,12 @@ export function init(RuntimeName, PHPLoader) {
20579
20761
  fillGamepadEventData(gamepadEvent, e['gamepad']);
20580
20762
 
20581
20763
  if (
20582
- ((a1, a2, a3) => {})(
20583
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20764
+ ((
20765
+ a1,
20766
+ a2,
20767
+ a3
20768
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20769
+ eventTypeId,
20584
20770
  gamepadEvent,
20585
20771
  userData
20586
20772
  )
@@ -20682,8 +20868,12 @@ export function init(RuntimeName, PHPLoader) {
20682
20868
  ) => {
20683
20869
  var beforeUnloadEventHandlerFunc = (e = event) => {
20684
20870
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
20685
- var confirmationMessage = ((a1, a2, a3) => {})(
20686
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20871
+ var confirmationMessage = ((
20872
+ a1,
20873
+ a2,
20874
+ a3
20875
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20876
+ eventTypeId,
20687
20877
  0,
20688
20878
  userData
20689
20879
  );
@@ -20754,8 +20944,12 @@ export function init(RuntimeName, PHPLoader) {
20754
20944
  fillBatteryEventData(batteryEvent, battery);
20755
20945
 
20756
20946
  if (
20757
- ((a1, a2, a3) => {})(
20758
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20947
+ ((
20948
+ a1,
20949
+ a2,
20950
+ a3
20951
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20952
+ eventTypeId,
20759
20953
  batteryEvent,
20760
20954
  userData
20761
20955
  )
@@ -20857,8 +21051,11 @@ export function init(RuntimeName, PHPLoader) {
20857
21051
 
20858
21052
  var _emscripten_request_animation_frame = (cb, userData) =>
20859
21053
  requestAnimationFrame((timeStamp) =>
20860
- ((a1, a2) => {})(
20861
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21054
+ ((
21055
+ a1,
21056
+ a2
21057
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21058
+ timeStamp,
20862
21059
  userData
20863
21060
  )
20864
21061
  );
@@ -20870,8 +21067,11 @@ export function init(RuntimeName, PHPLoader) {
20870
21067
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
20871
21068
  function tick(timeStamp) {
20872
21069
  if (
20873
- ((a1, a2) => {})(
20874
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
21070
+ ((
21071
+ a1,
21072
+ a2
21073
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21074
+ timeStamp,
20875
21075
  userData
20876
21076
  )
20877
21077
  ) {
@@ -21128,8 +21328,10 @@ export function init(RuntimeName, PHPLoader) {
21128
21328
  return emSetImmediate(() => {
21129
21329
  runtimeKeepalivePop();
21130
21330
  callUserCallback(() =>
21131
- ((a1) => {})(
21132
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21331
+ ((
21332
+ a1
21333
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21334
+ userData
21133
21335
  )
21134
21336
  );
21135
21337
  });
@@ -21146,8 +21348,10 @@ export function init(RuntimeName, PHPLoader) {
21146
21348
  function tick() {
21147
21349
  callUserCallback(() => {
21148
21350
  if (
21149
- ((a1) => {})(
21150
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21351
+ ((
21352
+ a1
21353
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21354
+ userData
21151
21355
  )
21152
21356
  ) {
21153
21357
  emSetImmediate(tick);
@@ -21164,8 +21368,10 @@ export function init(RuntimeName, PHPLoader) {
21164
21368
  var _emscripten_set_timeout = (cb, msecs, userData) =>
21165
21369
  safeSetTimeout(
21166
21370
  () =>
21167
- ((a1) => {})(
21168
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21371
+ ((
21372
+ a1
21373
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21374
+ userData
21169
21375
  ),
21170
21376
  msecs
21171
21377
  );
@@ -21181,8 +21387,11 @@ export function init(RuntimeName, PHPLoader) {
21181
21387
  runtimeKeepalivePop();
21182
21388
  callUserCallback(() => {
21183
21389
  if (
21184
- ((a1, a2) => {})(
21185
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
21390
+ ((
21391
+ a1,
21392
+ a2
21393
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21394
+ t,
21186
21395
  userData
21187
21396
  )
21188
21397
  ) {
@@ -21206,8 +21415,10 @@ export function init(RuntimeName, PHPLoader) {
21206
21415
  runtimeKeepalivePush();
21207
21416
  return setInterval(() => {
21208
21417
  callUserCallback(() =>
21209
- ((a1) => {})(
21210
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
21418
+ ((
21419
+ a1
21420
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21421
+ userData
21211
21422
  )
21212
21423
  );
21213
21424
  }, msecs);
@@ -21222,8 +21433,10 @@ export function init(RuntimeName, PHPLoader) {
21222
21433
 
21223
21434
  var _emscripten_async_call = (func, arg, millis) => {
21224
21435
  var wrapper = () =>
21225
- ((a1) => {})(
21226
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21436
+ ((
21437
+ a1
21438
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21439
+ arg
21227
21440
  );
21228
21441
 
21229
21442
  if (
@@ -21256,7 +21469,7 @@ export function init(RuntimeName, PHPLoader) {
21256
21469
 
21257
21470
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
21258
21471
  var iterFunc =
21259
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
21472
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
21260
21473
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
21261
21474
  };
21262
21475
  _emscripten_set_main_loop.sig = 'vpii';
@@ -21268,8 +21481,10 @@ export function init(RuntimeName, PHPLoader) {
21268
21481
  simulateInfiniteLoop
21269
21482
  ) => {
21270
21483
  var iterFunc = () =>
21271
- ((a1) => {})(
21272
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21484
+ ((
21485
+ a1
21486
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21487
+ arg
21273
21488
  );
21274
21489
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
21275
21490
  };
@@ -21290,8 +21505,10 @@ export function init(RuntimeName, PHPLoader) {
21290
21505
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
21291
21506
  MainLoop.queue.push({
21292
21507
  func: () => {
21293
- ((a1) => {})(
21294
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21508
+ ((
21509
+ a1
21510
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21511
+ arg
21295
21512
  );
21296
21513
  },
21297
21514
  name: UTF8ToString(name),
@@ -21304,8 +21521,10 @@ export function init(RuntimeName, PHPLoader) {
21304
21521
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
21305
21522
  MainLoop.queue.push({
21306
21523
  func: () => {
21307
- ((a1) => {})(
21308
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
21524
+ ((
21525
+ a1
21526
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21527
+ arg
21309
21528
  );
21310
21529
  },
21311
21530
  name: UTF8ToString(name),
@@ -21339,8 +21558,12 @@ export function init(RuntimeName, PHPLoader) {
21339
21558
  var resultPtr = stackAlloc(POINTER_SIZE);
21340
21559
  HEAPU32[resultPtr >> 2] = 0;
21341
21560
  try {
21342
- var result = ((a1, a2, a3) => {})(
21343
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
21561
+ var result = ((
21562
+ a1,
21563
+ a2,
21564
+ a3
21565
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21566
+ resultPtr,
21344
21567
  userData,
21345
21568
  value
21346
21569
  );
@@ -22177,15 +22400,19 @@ export function init(RuntimeName, PHPLoader) {
22177
22400
  () => {
22178
22401
  runtimeKeepalivePop();
22179
22402
  if (onload)
22180
- ((a1) => {})(
22181
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22403
+ ((
22404
+ a1
22405
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22406
+ file
22182
22407
  );
22183
22408
  },
22184
22409
  () => {
22185
22410
  runtimeKeepalivePop();
22186
22411
  if (onerror)
22187
- ((a1) => {})(
22188
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
22412
+ ((
22413
+ a1
22414
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22415
+ file
22189
22416
  );
22190
22417
  },
22191
22418
  true // don'tCreateFile - it's already there
@@ -22219,16 +22446,21 @@ export function init(RuntimeName, PHPLoader) {
22219
22446
  () => {
22220
22447
  runtimeKeepalivePop();
22221
22448
  if (onload)
22222
- ((a1, a2) => {})(
22223
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
22449
+ ((
22450
+ a1,
22451
+ a2
22452
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22453
+ arg,
22224
22454
  cname
22225
22455
  );
22226
22456
  },
22227
22457
  () => {
22228
22458
  runtimeKeepalivePop();
22229
22459
  if (onerror)
22230
- ((a1) => {})(
22231
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22460
+ ((
22461
+ a1
22462
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22463
+ arg
22232
22464
  );
22233
22465
  },
22234
22466
  true // don'tCreateFile - it's already there
@@ -22496,10 +22728,10 @@ export function init(RuntimeName, PHPLoader) {
22496
22728
  runtimeKeepalivePop();
22497
22729
  callUserCallback(() =>
22498
22730
  withStackSave(() =>
22499
- ((a1) => {})(
22500
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
22501
- _file
22502
- )
22731
+ ((
22732
+ a1
22733
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22734
+ stringToUTF8OnStack(_file)
22503
22735
  )
22504
22736
  )
22505
22737
  );
@@ -22543,8 +22775,12 @@ export function init(RuntimeName, PHPLoader) {
22543
22775
  callUserCallback(() => {
22544
22776
  var buffer = _malloc(byteArray.length);
22545
22777
  HEAPU8.set(byteArray, buffer);
22546
- ((a1, a2, a3) => {})(
22547
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
22778
+ ((
22779
+ a1,
22780
+ a2,
22781
+ a3
22782
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22783
+ userdata,
22548
22784
  buffer,
22549
22785
  byteArray.length
22550
22786
  );
@@ -22554,8 +22790,10 @@ export function init(RuntimeName, PHPLoader) {
22554
22790
  if (onerror) {
22555
22791
  runtimeKeepalivePop();
22556
22792
  callUserCallback(() => {
22557
- ((a1) => {})(
22558
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
22793
+ ((
22794
+ a1
22795
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22796
+ userdata
22559
22797
  );
22560
22798
  });
22561
22799
  }
@@ -22611,8 +22849,12 @@ export function init(RuntimeName, PHPLoader) {
22611
22849
  );
22612
22850
  if (onload) {
22613
22851
  var sp = stackSave();
22614
- ((a1, a2, a3) => {})(
22615
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22852
+ ((
22853
+ a1,
22854
+ a2,
22855
+ a3
22856
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22857
+ handle,
22616
22858
  userdata,
22617
22859
  stringToUTF8OnStack(_file)
22618
22860
  );
@@ -22620,8 +22862,12 @@ export function init(RuntimeName, PHPLoader) {
22620
22862
  }
22621
22863
  } else {
22622
22864
  if (onerror)
22623
- ((a1, a2, a3) => {})(
22624
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22865
+ ((
22866
+ a1,
22867
+ a2,
22868
+ a3
22869
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22870
+ handle,
22625
22871
  userdata,
22626
22872
  http.status
22627
22873
  );
@@ -22634,8 +22880,12 @@ export function init(RuntimeName, PHPLoader) {
22634
22880
  http.onerror = (e) => {
22635
22881
  runtimeKeepalivePop();
22636
22882
  if (onerror)
22637
- ((a1, a2, a3) => {})(
22638
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22883
+ ((
22884
+ a1,
22885
+ a2,
22886
+ a3
22887
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22888
+ handle,
22639
22889
  userdata,
22640
22890
  http.status
22641
22891
  );
@@ -22650,8 +22900,12 @@ export function init(RuntimeName, PHPLoader) {
22650
22900
  ) {
22651
22901
  var percentComplete = (e.loaded / e.total) * 100;
22652
22902
  if (onprogress)
22653
- ((a1, a2, a3) => {})(
22654
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22903
+ ((
22904
+ a1,
22905
+ a2,
22906
+ a3
22907
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22908
+ handle,
22655
22909
  userdata,
22656
22910
  percentComplete
22657
22911
  );
@@ -22708,8 +22962,13 @@ export function init(RuntimeName, PHPLoader) {
22708
22962
  if (http.statusText) {
22709
22963
  statusText = stringToUTF8OnStack(http.statusText);
22710
22964
  }
22711
- ((a1, a2, a3, a4) => {})(
22712
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22965
+ ((
22966
+ a1,
22967
+ a2,
22968
+ a3,
22969
+ a4
22970
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22971
+ handle,
22713
22972
  userdata,
22714
22973
  http.status,
22715
22974
  statusText
@@ -22730,8 +22989,13 @@ export function init(RuntimeName, PHPLoader) {
22730
22989
  var buffer = _malloc(byteArray.length);
22731
22990
  HEAPU8.set(byteArray, buffer);
22732
22991
  if (onload)
22733
- ((a1, a2, a3, a4) => {})(
22734
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
22992
+ ((
22993
+ a1,
22994
+ a2,
22995
+ a3,
22996
+ a4
22997
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22998
+ handle,
22735
22999
  userdata,
22736
23000
  buffer,
22737
23001
  byteArray.length
@@ -22752,8 +23016,13 @@ export function init(RuntimeName, PHPLoader) {
22752
23016
  // PROGRESS
22753
23017
  http.onprogress = (e) => {
22754
23018
  if (onprogress)
22755
- ((a1, a2, a3, a4) => {})(
22756
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
23019
+ ((
23020
+ a1,
23021
+ a2,
23022
+ a3,
23023
+ a4
23024
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23025
+ handle,
22757
23026
  userdata,
22758
23027
  e.loaded,
22759
23028
  e.lengthComputable || e.lengthComputable === undefined
@@ -23084,16 +23353,24 @@ export function init(RuntimeName, PHPLoader) {
23084
23353
  if (event === 'error') {
23085
23354
  withStackSave(() => {
23086
23355
  var msg = stringToUTF8OnStack(data[2]);
23087
- ((a1, a2, a3, a4) => {})(
23088
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
23356
+ ((
23357
+ a1,
23358
+ a2,
23359
+ a3,
23360
+ a4
23361
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23362
+ data[0],
23089
23363
  data[1],
23090
23364
  msg,
23091
23365
  userData
23092
23366
  );
23093
23367
  });
23094
23368
  } else {
23095
- ((a1, a2) => {})(
23096
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
23369
+ ((
23370
+ a1,
23371
+ a2
23372
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23373
+ data,
23097
23374
  userData
23098
23375
  );
23099
23376
  }
@@ -24046,8 +24323,12 @@ export function init(RuntimeName, PHPLoader) {
24046
24323
  ) => {
24047
24324
  var webGlEventHandlerFunc = (e = event) => {
24048
24325
  if (
24049
- ((a1, a2, a3) => {})(
24050
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
24326
+ ((
24327
+ a1,
24328
+ a2,
24329
+ a3
24330
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24331
+ eventTypeId,
24051
24332
  0,
24052
24333
  userData
24053
24334
  )
@@ -24266,15 +24547,21 @@ export function init(RuntimeName, PHPLoader) {
24266
24547
  ) {
24267
24548
  event.preventDefault();
24268
24549
  GLUT.saveModifiers(event);
24269
- ((a1, a2) => {})(
24270
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
24550
+ ((
24551
+ a1,
24552
+ a2
24553
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24554
+ lastX,
24271
24555
  lastY
24272
24556
  );
24273
24557
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
24274
24558
  event.preventDefault();
24275
24559
  GLUT.saveModifiers(event);
24276
- ((a1, a2) => {})(
24277
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
24560
+ ((
24561
+ a1,
24562
+ a2
24563
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24564
+ lastX,
24278
24565
  lastY
24279
24566
  );
24280
24567
  }
@@ -24435,8 +24722,12 @@ export function init(RuntimeName, PHPLoader) {
24435
24722
  if (GLUT.specialFunc) {
24436
24723
  event.preventDefault();
24437
24724
  GLUT.saveModifiers(event);
24438
- ((a1, a2, a3) => {})(
24439
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24725
+ ((
24726
+ a1,
24727
+ a2,
24728
+ a3
24729
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24730
+ key,
24440
24731
  Browser.mouseX,
24441
24732
  Browser.mouseY
24442
24733
  );
@@ -24446,8 +24737,12 @@ export function init(RuntimeName, PHPLoader) {
24446
24737
  if (key !== null && GLUT.keyboardFunc) {
24447
24738
  event.preventDefault();
24448
24739
  GLUT.saveModifiers(event);
24449
- ((a1, a2, a3) => {})(
24450
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24740
+ ((
24741
+ a1,
24742
+ a2,
24743
+ a3
24744
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24745
+ key,
24451
24746
  Browser.mouseX,
24452
24747
  Browser.mouseY
24453
24748
  );
@@ -24462,8 +24757,12 @@ export function init(RuntimeName, PHPLoader) {
24462
24757
  if (GLUT.specialUpFunc) {
24463
24758
  event.preventDefault();
24464
24759
  GLUT.saveModifiers(event);
24465
- ((a1, a2, a3) => {})(
24466
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24760
+ ((
24761
+ a1,
24762
+ a2,
24763
+ a3
24764
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24765
+ key,
24467
24766
  Browser.mouseX,
24468
24767
  Browser.mouseY
24469
24768
  );
@@ -24473,8 +24772,12 @@ export function init(RuntimeName, PHPLoader) {
24473
24772
  if (key !== null && GLUT.keyboardUpFunc) {
24474
24773
  event.preventDefault();
24475
24774
  GLUT.saveModifiers(event);
24476
- ((a1, a2, a3) => {})(
24477
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
24775
+ ((
24776
+ a1,
24777
+ a2,
24778
+ a3
24779
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24780
+ key,
24478
24781
  Browser.mouseX,
24479
24782
  Browser.mouseY
24480
24783
  );
@@ -24538,10 +24841,13 @@ export function init(RuntimeName, PHPLoader) {
24538
24841
  } catch (e) {}
24539
24842
  event.preventDefault();
24540
24843
  GLUT.saveModifiers(event);
24541
- ((a1, a2, a3, a4) => {})(
24542
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
24543
- 'button'
24544
- ],
24844
+ ((
24845
+ a1,
24846
+ a2,
24847
+ a3,
24848
+ a4
24849
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24850
+ event['button'],
24545
24851
  0 /*GLUT_DOWN*/,
24546
24852
  Browser.mouseX,
24547
24853
  Browser.mouseY
@@ -24556,10 +24862,13 @@ export function init(RuntimeName, PHPLoader) {
24556
24862
  if (GLUT.mouseFunc) {
24557
24863
  event.preventDefault();
24558
24864
  GLUT.saveModifiers(event);
24559
- ((a1, a2, a3, a4) => {})(
24560
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
24561
- 'button'
24562
- ],
24865
+ ((
24866
+ a1,
24867
+ a2,
24868
+ a3,
24869
+ a4
24870
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24871
+ event['button'],
24563
24872
  1 /*GLUT_UP*/,
24564
24873
  Browser.mouseX,
24565
24874
  Browser.mouseY
@@ -24588,8 +24897,13 @@ export function init(RuntimeName, PHPLoader) {
24588
24897
  if (GLUT.mouseFunc) {
24589
24898
  event.preventDefault();
24590
24899
  GLUT.saveModifiers(event);
24591
- ((a1, a2, a3, a4) => {})(
24592
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
24900
+ ((
24901
+ a1,
24902
+ a2,
24903
+ a3,
24904
+ a4
24905
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24906
+ button,
24593
24907
  0 /*GLUT_DOWN*/,
24594
24908
  Browser.mouseX,
24595
24909
  Browser.mouseY
@@ -24627,8 +24941,11 @@ export function init(RuntimeName, PHPLoader) {
24627
24941
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
24628
24942
  if (GLUT.reshapeFunc) {
24629
24943
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
24630
- ((a1, a2) => {})(
24631
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
24944
+ ((
24945
+ a1,
24946
+ a2
24947
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24948
+ width,
24632
24949
  height
24633
24950
  );
24634
24951
  }
@@ -24684,8 +25001,11 @@ export function init(RuntimeName, PHPLoader) {
24684
25001
  // Resize callback stage 2: updateResizeListeners notifies reshapeFunc
24685
25002
  Browser.resizeListeners.push((width, height) => {
24686
25003
  if (GLUT.reshapeFunc) {
24687
- ((a1, a2) => {})(
24688
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25004
+ ((
25005
+ a1,
25006
+ a2
25007
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25008
+ width,
24689
25009
  height
24690
25010
  );
24691
25011
  }
@@ -24800,8 +25120,10 @@ export function init(RuntimeName, PHPLoader) {
24800
25120
  var _glutTimerFunc = (msec, func, value) =>
24801
25121
  safeSetTimeout(
24802
25122
  () =>
24803
- ((a1) => {})(
24804
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25123
+ ((
25124
+ a1
25125
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25126
+ value
24805
25127
  ),
24806
25128
  msec
24807
25129
  );
@@ -24961,8 +25283,11 @@ export function init(RuntimeName, PHPLoader) {
24961
25283
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
24962
25284
  // Just call it once here.
24963
25285
  if (GLUT.reshapeFunc) {
24964
- ((a1, a2) => {})(
24965
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25286
+ ((
25287
+ a1,
25288
+ a2
25289
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25290
+ width,
24966
25291
  height
24967
25292
  );
24968
25293
  }
@@ -26016,15 +26341,21 @@ export function init(RuntimeName, PHPLoader) {
26016
26341
  callUserCallback(() => {
26017
26342
  if (error) {
26018
26343
  if (onerror)
26019
- ((a1) => {})(
26020
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26344
+ ((
26345
+ a1
26346
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26347
+ arg
26021
26348
  );
26022
26349
  return;
26023
26350
  }
26024
26351
  var buffer = _malloc(byteArray.length);
26025
26352
  HEAPU8.set(byteArray, buffer);
26026
- ((a1, a2, a3) => {})(
26027
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26353
+ ((
26354
+ a1,
26355
+ a2,
26356
+ a3
26357
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26358
+ arg,
26028
26359
  buffer,
26029
26360
  byteArray.length
26030
26361
  );
@@ -26056,14 +26387,18 @@ export function init(RuntimeName, PHPLoader) {
26056
26387
  callUserCallback(() => {
26057
26388
  if (error) {
26058
26389
  if (onerror)
26059
- ((a1) => {})(
26060
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26390
+ ((
26391
+ a1
26392
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26393
+ arg
26061
26394
  );
26062
26395
  return;
26063
26396
  }
26064
26397
  if (onstore)
26065
- ((a1) => {})(
26066
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26398
+ ((
26399
+ a1
26400
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26401
+ arg
26067
26402
  );
26068
26403
  });
26069
26404
  }
@@ -26078,14 +26413,18 @@ export function init(RuntimeName, PHPLoader) {
26078
26413
  callUserCallback(() => {
26079
26414
  if (error) {
26080
26415
  if (onerror)
26081
- ((a1) => {})(
26082
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26416
+ ((
26417
+ a1
26418
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26419
+ arg
26083
26420
  );
26084
26421
  return;
26085
26422
  }
26086
26423
  if (ondelete)
26087
- ((a1) => {})(
26088
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26424
+ ((
26425
+ a1
26426
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26427
+ arg
26089
26428
  );
26090
26429
  });
26091
26430
  });
@@ -26102,14 +26441,19 @@ export function init(RuntimeName, PHPLoader) {
26102
26441
  callUserCallback(() => {
26103
26442
  if (error) {
26104
26443
  if (onerror)
26105
- ((a1) => {})(
26106
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26444
+ ((
26445
+ a1
26446
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26447
+ arg
26107
26448
  );
26108
26449
  return;
26109
26450
  }
26110
26451
  if (oncheck)
26111
- ((a1, a2) => {})(
26112
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
26452
+ ((
26453
+ a1,
26454
+ a2
26455
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26456
+ arg,
26113
26457
  exists
26114
26458
  );
26115
26459
  });
@@ -26125,14 +26469,18 @@ export function init(RuntimeName, PHPLoader) {
26125
26469
  callUserCallback(() => {
26126
26470
  if (error) {
26127
26471
  if (onerror)
26128
- ((a1) => {})(
26129
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26472
+ ((
26473
+ a1
26474
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26475
+ arg
26130
26476
  );
26131
26477
  return;
26132
26478
  }
26133
26479
  if (onclear)
26134
- ((a1) => {})(
26135
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
26480
+ ((
26481
+ a1
26482
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26483
+ arg
26136
26484
  );
26137
26485
  });
26138
26486
  });
@@ -26289,8 +26637,11 @@ export function init(RuntimeName, PHPLoader) {
26289
26637
  safeSetTimeout(() => {
26290
26638
  var stackBegin = Asyncify.currData + 12;
26291
26639
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
26292
- ((a1, a2) => {})(
26293
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
26640
+ ((
26641
+ a1,
26642
+ a2
26643
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26644
+ stackBegin,
26294
26645
  stackEnd
26295
26646
  );
26296
26647
  wakeUp();
@@ -26339,8 +26690,10 @@ export function init(RuntimeName, PHPLoader) {
26339
26690
  HEAPU32[(newFiber + 12) >> 2] = 0;
26340
26691
 
26341
26692
  var userData = HEAPU32[(newFiber + 16) >> 2];
26342
- ((a1) => {})(
26343
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
26693
+ ((
26694
+ a1
26695
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26696
+ userData
26344
26697
  );
26345
26698
  } else {
26346
26699
  var asyncifyData = newFiber + 20;
@@ -27351,8 +27704,11 @@ export function init(RuntimeName, PHPLoader) {
27351
27704
  if (!SDL.eventHandler) return;
27352
27705
 
27353
27706
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
27354
- ((a1, a2) => {})(
27355
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
27707
+ ((
27708
+ a1,
27709
+ a2
27710
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27711
+ SDL.eventHandlerContext,
27356
27712
  SDL.eventHandlerTemp
27357
27713
  );
27358
27714
  }
@@ -28976,9 +29332,12 @@ export function init(RuntimeName, PHPLoader) {
28976
29332
  return;
28977
29333
 
28978
29334
  // Ask SDL audio data from the user code.
28979
- ((a1, a2, a3) => {})(
28980
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
28981
- .audio.userdata,
29335
+ ((
29336
+ a1,
29337
+ a2,
29338
+ a3
29339
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29340
+ SDL.audio.userdata,
28982
29341
  SDL.audio.buffer,
28983
29342
  SDL.audio.bufferSize
28984
29343
  );
@@ -29436,8 +29795,10 @@ export function init(RuntimeName, PHPLoader) {
29436
29795
  info.audio = null;
29437
29796
  }
29438
29797
  if (SDL.channelFinished) {
29439
- ((a1) => {})(
29440
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
29798
+ ((
29799
+ a1
29800
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29801
+ channel
29441
29802
  );
29442
29803
  }
29443
29804
  }
@@ -29505,8 +29866,10 @@ export function init(RuntimeName, PHPLoader) {
29505
29866
  channelInfo.audio = null;
29506
29867
  }
29507
29868
  if (SDL.channelFinished)
29508
- ((a1) => {})(
29509
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
29869
+ ((
29870
+ a1
29871
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
29872
+ channel
29510
29873
  );
29511
29874
  };
29512
29875
  if (channelInfo.audio) {
@@ -30241,8 +30604,11 @@ export function init(RuntimeName, PHPLoader) {
30241
30604
  var _SDL_AddTimer = (interval, callback, param) =>
30242
30605
  safeSetTimeout(
30243
30606
  () =>
30244
- ((a1, a2) => {})(
30245
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
30607
+ ((
30608
+ a1,
30609
+ a2
30610
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30611
+ interval,
30246
30612
  param
30247
30613
  ),
30248
30614
  interval
@@ -30475,26 +30841,6 @@ export function init(RuntimeName, PHPLoader) {
30475
30841
  });
30476
30842
  };
30477
30843
 
30478
- function _recv(sockfd, buffer, size, flags) {
30479
- return _wasm_recv(sockfd, buffer, size, flags);
30480
- }
30481
-
30482
- function _setsockopt(
30483
- socketd,
30484
- level,
30485
- optionName,
30486
- optionValuePtr,
30487
- optionLen
30488
- ) {
30489
- return _wasm_setsockopt(
30490
- socketd,
30491
- level,
30492
- optionName,
30493
- optionValuePtr,
30494
- optionLen
30495
- );
30496
- }
30497
-
30498
30844
  function ___emscripten_lookup_name(namePtr) {
30499
30845
  if (!ENVIRONMENT_IS_NODE) {
30500
30846
  return original__emscripten_lookup_name(namePtr);
@@ -30656,8 +31002,12 @@ export function init(RuntimeName, PHPLoader) {
30656
31002
 
30657
31003
  socket.onopen = function (e) {
30658
31004
  var eventPtr = WS.getSocketEvent(socketId);
30659
- ((a1, a2, a3) => {})(
30660
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31005
+ ((
31006
+ a1,
31007
+ a2,
31008
+ a3
31009
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31010
+ 0 /*TODO*/,
30661
31011
  eventPtr,
30662
31012
  userData
30663
31013
  );
@@ -30679,8 +31029,12 @@ export function init(RuntimeName, PHPLoader) {
30679
31029
 
30680
31030
  socket.onerror = function (e) {
30681
31031
  var eventPtr = WS.getSocketEvent(socketId);
30682
- ((a1, a2, a3) => {})(
30683
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31032
+ ((
31033
+ a1,
31034
+ a2,
31035
+ a3
31036
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31037
+ 0 /*TODO*/,
30684
31038
  eventPtr,
30685
31039
  userData
30686
31040
  );
@@ -30705,8 +31059,12 @@ export function init(RuntimeName, PHPLoader) {
30705
31059
  ((HEAP8[eventPtr + 4] = e.wasClean),
30706
31060
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
30707
31061
  stringToUTF8(e.reason, eventPtr + 8, 512));
30708
- ((a1, a2, a3) => {})(
30709
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31062
+ ((
31063
+ a1,
31064
+ a2,
31065
+ a3
31066
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31067
+ 0 /*TODO*/,
30710
31068
  eventPtr,
30711
31069
  userData
30712
31070
  );
@@ -30740,8 +31098,12 @@ export function init(RuntimeName, PHPLoader) {
30740
31098
  ((HEAPU32[(eventPtr + 4) >> 2] = buf),
30741
31099
  (HEAP32[(eventPtr + 8) >> 2] = len),
30742
31100
  (HEAP8[eventPtr + 12] = isText),
30743
- ((a1, a2, a3) => {})(
30744
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31101
+ ((
31102
+ a1,
31103
+ a2,
31104
+ a3
31105
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31106
+ 0 /*TODO*/,
30745
31107
  eventPtr,
30746
31108
  userData
30747
31109
  ));
@@ -30985,8 +31347,6 @@ export function init(RuntimeName, PHPLoader) {
30985
31347
  Module['___cxa_rethrow_primary_exception'] =
30986
31348
  ___cxa_rethrow_primary_exception;
30987
31349
  Module['___syscall_shutdown'] = ___syscall_shutdown;
30988
- Module['_recv'] = _recv;
30989
- Module['_setsockopt'] = _setsockopt;
30990
31350
  // End JS library exports
30991
31351
 
30992
31352
  // end include: postlibrary.js
@@ -31373,7 +31733,7 @@ export function init(RuntimeName, PHPLoader) {
31373
31733
  wasmMemory;
31374
31734
 
31375
31735
  function assignWasmExports(wasmExports) {
31376
- _free = PHPLoader['free'] = wasmExports['free'];
31736
+ _free = wasmExports['free'];
31377
31737
  _memcmp = wasmExports['memcmp'];
31378
31738
  _malloc =
31379
31739
  PHPLoader['malloc'] =
@@ -31441,7 +31801,10 @@ export function init(RuntimeName, PHPLoader) {
31441
31801
  wasmExports['wasm_sapi_handle_request'];
31442
31802
  _php_wasm_init = Module['_php_wasm_init'] =
31443
31803
  wasmExports['php_wasm_init'];
31444
- _wasm_free = Module['_wasm_free'] = wasmExports['wasm_free'];
31804
+ _wasm_free =
31805
+ PHPLoader['free'] =
31806
+ Module['_wasm_free'] =
31807
+ wasmExports['wasm_free'];
31445
31808
  _wasm_get_end_offset = Module['_wasm_get_end_offset'] =
31446
31809
  wasmExports['wasm_get_end_offset'];
31447
31810
  ___wrap_getpid = Module['___wrap_getpid'] =
@@ -34087,12 +34450,8 @@ export function init(RuntimeName, PHPLoader) {
34087
34450
  wasm_poll_socket,
34088
34451
  /** @export */
34089
34452
  wasm_recv: _wasm_recv,
34090
- /** */
34091
- recv: _recv,
34092
34453
  /** @export */
34093
34454
  wasm_setsockopt: _wasm_setsockopt,
34094
- /** */
34095
- setsockopt: _setsockopt,
34096
34455
  /** @export */
34097
34456
  wasm_shutdown: _wasm_shutdown,
34098
34457
  /** @export */