@php-wasm/node 2.0.3 → 2.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
1774
1774
  );
1775
1775
 
1776
1776
  var ___call_sighandler = (fp, sig) =>
1777
- ((a1) => {})(
1778
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
1777
+ ((
1778
+ a1
1779
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
1780
+ sig
1779
1781
  );
1780
1782
  ___call_sighandler.sig = 'vpi';
1781
1783
 
@@ -7348,6 +7350,8 @@ export function init(RuntimeName, PHPLoader) {
7348
7350
  return -ERRNO_CODES.EBADF;
7349
7351
  }
7350
7352
 
7353
+ const flockStructAddr = syscallGetVarargP();
7354
+
7351
7355
  if (!locking.is_path_to_shared_fs(vfsPath)) {
7352
7356
  _js_wasm_trace(
7353
7357
  "fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
@@ -7363,7 +7367,6 @@ export function init(RuntimeName, PHPLoader) {
7363
7367
  return 0;
7364
7368
  }
7365
7369
 
7366
- const flockStructAddr = syscallGetVarargP();
7367
7370
  const flockStruct = read_flock_struct(flockStructAddr);
7368
7371
 
7369
7372
  if (!(flockStruct.l_type in locking.fcntlToLockState)) {
@@ -8791,8 +8794,11 @@ export function init(RuntimeName, PHPLoader) {
8791
8794
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8792
8795
  runtimeKeepalivePop();
8793
8796
  callUserCallback(() =>
8794
- ((a1, a2) => {})(
8795
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8797
+ ((
8798
+ a1,
8799
+ a2
8800
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8801
+ handle,
8796
8802
  user_data
8797
8803
  )
8798
8804
  );
@@ -8800,8 +8806,11 @@ export function init(RuntimeName, PHPLoader) {
8800
8806
  function successCallback() {
8801
8807
  runtimeKeepalivePop();
8802
8808
  callUserCallback(() =>
8803
- ((a1, a2) => {})(
8804
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8809
+ ((
8810
+ a1,
8811
+ a2
8812
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8813
+ handle,
8805
8814
  user_data
8806
8815
  )
8807
8816
  );
@@ -19459,8 +19468,11 @@ export function init(RuntimeName, PHPLoader) {
19459
19468
  var trace = getCallstack();
19460
19469
  var parts = trace.split('\n');
19461
19470
  for (var i = 0; i < parts.length; i++) {
19462
- var ret = ((a1, a2) => {})(
19463
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
19471
+ var ret = ((
19472
+ a1,
19473
+ a2
19474
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19475
+ 0,
19464
19476
  arg
19465
19477
  );
19466
19478
  if (ret !== 0) return;
@@ -20036,8 +20048,12 @@ export function init(RuntimeName, PHPLoader) {
20036
20048
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
20037
20049
 
20038
20050
  if (
20039
- ((a1, a2, a3) => {})(
20040
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20051
+ ((
20052
+ a1,
20053
+ a2,
20054
+ a3
20055
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20056
+ eventTypeId,
20041
20057
  keyEventData,
20042
20058
  userData
20043
20059
  )
@@ -20155,8 +20171,12 @@ export function init(RuntimeName, PHPLoader) {
20155
20171
  fillMouseEventData(JSEvents.mouseEvent, e, target);
20156
20172
 
20157
20173
  if (
20158
- ((a1, a2, a3) => {})(
20159
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20174
+ ((
20175
+ a1,
20176
+ a2,
20177
+ a3
20178
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20179
+ eventTypeId,
20160
20180
  JSEvents.mouseEvent,
20161
20181
  userData
20162
20182
  )
@@ -20370,8 +20390,12 @@ export function init(RuntimeName, PHPLoader) {
20370
20390
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
20371
20391
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
20372
20392
  if (
20373
- ((a1, a2, a3) => {})(
20374
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20393
+ ((
20394
+ a1,
20395
+ a2,
20396
+ a3
20397
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20398
+ eventTypeId,
20375
20399
  wheelEvent,
20376
20400
  userData
20377
20401
  )
@@ -20452,8 +20476,12 @@ export function init(RuntimeName, PHPLoader) {
20452
20476
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
20453
20477
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
20454
20478
  if (
20455
- ((a1, a2, a3) => {})(
20456
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20479
+ ((
20480
+ a1,
20481
+ a2,
20482
+ a3
20483
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20484
+ eventTypeId,
20457
20485
  uiEvent,
20458
20486
  userData
20459
20487
  )
@@ -20527,8 +20555,12 @@ export function init(RuntimeName, PHPLoader) {
20527
20555
  stringToUTF8(id, focusEvent + 128, 128);
20528
20556
 
20529
20557
  if (
20530
- ((a1, a2, a3) => {})(
20531
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20558
+ ((
20559
+ a1,
20560
+ a2,
20561
+ a3
20562
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20563
+ eventTypeId,
20532
20564
  focusEvent,
20533
20565
  userData
20534
20566
  )
@@ -20644,8 +20676,12 @@ export function init(RuntimeName, PHPLoader) {
20644
20676
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
20645
20677
 
20646
20678
  if (
20647
- ((a1, a2, a3) => {})(
20648
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20679
+ ((
20680
+ a1,
20681
+ a2,
20682
+ a3
20683
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20684
+ eventTypeId,
20649
20685
  JSEvents.deviceOrientationEvent,
20650
20686
  userData
20651
20687
  )
@@ -20728,8 +20764,12 @@ export function init(RuntimeName, PHPLoader) {
20728
20764
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
20729
20765
 
20730
20766
  if (
20731
- ((a1, a2, a3) => {})(
20732
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20767
+ ((
20768
+ a1,
20769
+ a2,
20770
+ a3
20771
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20772
+ eventTypeId,
20733
20773
  JSEvents.deviceMotionEvent,
20734
20774
  userData
20735
20775
  )
@@ -20839,8 +20879,12 @@ export function init(RuntimeName, PHPLoader) {
20839
20879
  fillOrientationChangeEventData(orientationChangeEvent);
20840
20880
 
20841
20881
  if (
20842
- ((a1, a2, a3) => {})(
20843
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20882
+ ((
20883
+ a1,
20884
+ a2,
20885
+ a3
20886
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20887
+ eventTypeId,
20844
20888
  orientationChangeEvent,
20845
20889
  userData
20846
20890
  )
@@ -20973,8 +21017,12 @@ export function init(RuntimeName, PHPLoader) {
20973
21017
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20974
21018
 
20975
21019
  if (
20976
- ((a1, a2, a3) => {})(
20977
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21020
+ ((
21021
+ a1,
21022
+ a2,
21023
+ a3
21024
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21025
+ eventTypeId,
20978
21026
  fullscreenChangeEvent,
20979
21027
  userData
20980
21028
  )
@@ -21138,8 +21186,12 @@ export function init(RuntimeName, PHPLoader) {
21138
21186
  );
21139
21187
 
21140
21188
  if (currentFullscreenStrategy.canvasResizedCallback) {
21141
- ((a1, a2, a3) => {})(
21142
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21189
+ ((
21190
+ a1,
21191
+ a2,
21192
+ a3
21193
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21194
+ 37,
21143
21195
  0,
21144
21196
  currentFullscreenStrategy.canvasResizedCallbackUserData
21145
21197
  );
@@ -21245,8 +21297,12 @@ export function init(RuntimeName, PHPLoader) {
21245
21297
  currentFullscreenStrategy = strategy;
21246
21298
 
21247
21299
  if (strategy.canvasResizedCallback) {
21248
- ((a1, a2, a3) => {})(
21249
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21300
+ ((
21301
+ a1,
21302
+ a2,
21303
+ a3
21304
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21305
+ 37,
21250
21306
  0,
21251
21307
  strategy.canvasResizedCallbackUserData
21252
21308
  );
@@ -21348,8 +21404,12 @@ export function init(RuntimeName, PHPLoader) {
21348
21404
  !inCenteredWithoutScalingFullscreenMode &&
21349
21405
  currentFullscreenStrategy.canvasResizedCallback
21350
21406
  ) {
21351
- ((a1, a2, a3) => {})(
21352
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21407
+ ((
21408
+ a1,
21409
+ a2,
21410
+ a3
21411
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21412
+ 37,
21353
21413
  0,
21354
21414
  currentFullscreenStrategy.canvasResizedCallbackUserData
21355
21415
  );
@@ -21448,8 +21508,12 @@ export function init(RuntimeName, PHPLoader) {
21448
21508
  softFullscreenResizeWebGLRenderTarget
21449
21509
  );
21450
21510
  if (strategy.canvasResizedCallback) {
21451
- ((a1, a2, a3) => {})(
21452
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21511
+ ((
21512
+ a1,
21513
+ a2,
21514
+ a3
21515
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21516
+ 37,
21453
21517
  0,
21454
21518
  strategy.canvasResizedCallbackUserData
21455
21519
  );
@@ -21462,8 +21526,12 @@ export function init(RuntimeName, PHPLoader) {
21462
21526
 
21463
21527
  // Inform the caller that the canvas size has changed.
21464
21528
  if (strategy.canvasResizedCallback) {
21465
- ((a1, a2, a3) => {})(
21466
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21529
+ ((
21530
+ a1,
21531
+ a2,
21532
+ a3
21533
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21534
+ 37,
21467
21535
  0,
21468
21536
  strategy.canvasResizedCallbackUserData
21469
21537
  );
@@ -21531,8 +21599,12 @@ export function init(RuntimeName, PHPLoader) {
21531
21599
  fillPointerlockChangeEventData(pointerlockChangeEvent);
21532
21600
 
21533
21601
  if (
21534
- ((a1, a2, a3) => {})(
21535
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21602
+ ((
21603
+ a1,
21604
+ a2,
21605
+ a3
21606
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21607
+ eventTypeId,
21536
21608
  pointerlockChangeEvent,
21537
21609
  userData
21538
21610
  )
@@ -21622,8 +21694,12 @@ export function init(RuntimeName, PHPLoader) {
21622
21694
  ) => {
21623
21695
  var pointerlockErrorEventHandlerFunc = (e = event) => {
21624
21696
  if (
21625
- ((a1, a2, a3) => {})(
21626
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21697
+ ((
21698
+ a1,
21699
+ a2,
21700
+ a3
21701
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21702
+ eventTypeId,
21627
21703
  0,
21628
21704
  userData
21629
21705
  )
@@ -21823,8 +21899,12 @@ export function init(RuntimeName, PHPLoader) {
21823
21899
  fillVisibilityChangeEventData(visibilityChangeEvent);
21824
21900
 
21825
21901
  if (
21826
- ((a1, a2, a3) => {})(
21827
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21902
+ ((
21903
+ a1,
21904
+ a2,
21905
+ a3
21906
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21907
+ eventTypeId,
21828
21908
  visibilityChangeEvent,
21829
21909
  userData
21830
21910
  )
@@ -21944,8 +22024,12 @@ export function init(RuntimeName, PHPLoader) {
21944
22024
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21945
22025
 
21946
22026
  if (
21947
- ((a1, a2, a3) => {})(
21948
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22027
+ ((
22028
+ a1,
22029
+ a2,
22030
+ a3
22031
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22032
+ eventTypeId,
21949
22033
  touchEvent,
21950
22034
  userData
21951
22035
  )
@@ -22083,8 +22167,12 @@ export function init(RuntimeName, PHPLoader) {
22083
22167
  fillGamepadEventData(gamepadEvent, e['gamepad']);
22084
22168
 
22085
22169
  if (
22086
- ((a1, a2, a3) => {})(
22087
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22170
+ ((
22171
+ a1,
22172
+ a2,
22173
+ a3
22174
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22175
+ eventTypeId,
22088
22176
  gamepadEvent,
22089
22177
  userData
22090
22178
  )
@@ -22186,8 +22274,12 @@ export function init(RuntimeName, PHPLoader) {
22186
22274
  ) => {
22187
22275
  var beforeUnloadEventHandlerFunc = (e = event) => {
22188
22276
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
22189
- var confirmationMessage = ((a1, a2, a3) => {})(
22190
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22277
+ var confirmationMessage = ((
22278
+ a1,
22279
+ a2,
22280
+ a3
22281
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22282
+ eventTypeId,
22191
22283
  0,
22192
22284
  userData
22193
22285
  );
@@ -22258,8 +22350,12 @@ export function init(RuntimeName, PHPLoader) {
22258
22350
  fillBatteryEventData(batteryEvent, battery());
22259
22351
 
22260
22352
  if (
22261
- ((a1, a2, a3) => {})(
22262
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22353
+ ((
22354
+ a1,
22355
+ a2,
22356
+ a3
22357
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22358
+ eventTypeId,
22263
22359
  batteryEvent,
22264
22360
  userData
22265
22361
  )
@@ -22349,8 +22445,11 @@ export function init(RuntimeName, PHPLoader) {
22349
22445
 
22350
22446
  var _emscripten_request_animation_frame = (cb, userData) =>
22351
22447
  requestAnimationFrame((timeStamp) =>
22352
- ((a1, a2) => {})(
22353
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22448
+ ((
22449
+ a1,
22450
+ a2
22451
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22452
+ timeStamp,
22354
22453
  userData
22355
22454
  )
22356
22455
  );
@@ -22362,8 +22461,11 @@ export function init(RuntimeName, PHPLoader) {
22362
22461
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
22363
22462
  function tick(timeStamp) {
22364
22463
  if (
22365
- ((a1, a2) => {})(
22366
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22464
+ ((
22465
+ a1,
22466
+ a2
22467
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22468
+ timeStamp,
22367
22469
  userData
22368
22470
  )
22369
22471
  ) {
@@ -22588,8 +22690,10 @@ export function init(RuntimeName, PHPLoader) {
22588
22690
  return emSetImmediate(() => {
22589
22691
  runtimeKeepalivePop();
22590
22692
  callUserCallback(() =>
22591
- ((a1) => {})(
22592
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22693
+ ((
22694
+ a1
22695
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22696
+ userData
22593
22697
  )
22594
22698
  );
22595
22699
  });
@@ -22606,8 +22710,10 @@ export function init(RuntimeName, PHPLoader) {
22606
22710
  function tick() {
22607
22711
  callUserCallback(() => {
22608
22712
  if (
22609
- ((a1) => {})(
22610
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22713
+ ((
22714
+ a1
22715
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22716
+ userData
22611
22717
  )
22612
22718
  ) {
22613
22719
  emSetImmediate(tick);
@@ -22624,8 +22730,10 @@ export function init(RuntimeName, PHPLoader) {
22624
22730
  var _emscripten_set_timeout = (cb, msecs, userData) =>
22625
22731
  safeSetTimeout(
22626
22732
  () =>
22627
- ((a1) => {})(
22628
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22733
+ ((
22734
+ a1
22735
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22736
+ userData
22629
22737
  ),
22630
22738
  msecs
22631
22739
  );
@@ -22641,8 +22749,11 @@ export function init(RuntimeName, PHPLoader) {
22641
22749
  runtimeKeepalivePop();
22642
22750
  callUserCallback(() => {
22643
22751
  if (
22644
- ((a1, a2) => {})(
22645
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
22752
+ ((
22753
+ a1,
22754
+ a2
22755
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22756
+ t,
22646
22757
  userData
22647
22758
  )
22648
22759
  ) {
@@ -22666,8 +22777,10 @@ export function init(RuntimeName, PHPLoader) {
22666
22777
  runtimeKeepalivePush();
22667
22778
  return setInterval(() => {
22668
22779
  callUserCallback(() =>
22669
- ((a1) => {})(
22670
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22780
+ ((
22781
+ a1
22782
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22783
+ userData
22671
22784
  )
22672
22785
  );
22673
22786
  }, msecs);
@@ -22682,8 +22795,10 @@ export function init(RuntimeName, PHPLoader) {
22682
22795
 
22683
22796
  var _emscripten_async_call = (func, arg, millis) => {
22684
22797
  var wrapper = () =>
22685
- ((a1) => {})(
22686
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22798
+ ((
22799
+ a1
22800
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22801
+ arg
22687
22802
  );
22688
22803
 
22689
22804
  if (
@@ -22716,7 +22831,7 @@ export function init(RuntimeName, PHPLoader) {
22716
22831
 
22717
22832
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
22718
22833
  var iterFunc =
22719
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
22834
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
22720
22835
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
22721
22836
  };
22722
22837
  _emscripten_set_main_loop.sig = 'vpii';
@@ -22728,8 +22843,10 @@ export function init(RuntimeName, PHPLoader) {
22728
22843
  simulateInfiniteLoop
22729
22844
  ) => {
22730
22845
  var iterFunc = () =>
22731
- ((a1) => {})(
22732
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22846
+ ((
22847
+ a1
22848
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22849
+ arg
22733
22850
  );
22734
22851
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
22735
22852
  };
@@ -22750,8 +22867,10 @@ export function init(RuntimeName, PHPLoader) {
22750
22867
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
22751
22868
  MainLoop.queue.push({
22752
22869
  func: () => {
22753
- ((a1) => {})(
22754
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22870
+ ((
22871
+ a1
22872
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22873
+ arg
22755
22874
  );
22756
22875
  },
22757
22876
  name: UTF8ToString(name),
@@ -22764,8 +22883,10 @@ export function init(RuntimeName, PHPLoader) {
22764
22883
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
22765
22884
  MainLoop.queue.push({
22766
22885
  func: () => {
22767
- ((a1) => {})(
22768
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22886
+ ((
22887
+ a1
22888
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22889
+ arg
22769
22890
  );
22770
22891
  },
22771
22892
  name: UTF8ToString(name),
@@ -22799,8 +22920,12 @@ export function init(RuntimeName, PHPLoader) {
22799
22920
  var resultPtr = stackAlloc(POINTER_SIZE);
22800
22921
  HEAPU32[resultPtr >> 2] = 0;
22801
22922
  try {
22802
- var result = ((a1, a2, a3) => {})(
22803
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22923
+ var result = ((
22924
+ a1,
22925
+ a2,
22926
+ a3
22927
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22928
+ resultPtr,
22804
22929
  userData,
22805
22930
  value
22806
22931
  );
@@ -23736,15 +23861,19 @@ export function init(RuntimeName, PHPLoader) {
23736
23861
  () => {
23737
23862
  runtimeKeepalivePop();
23738
23863
  if (onload)
23739
- ((a1) => {})(
23740
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23864
+ ((
23865
+ a1
23866
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23867
+ file
23741
23868
  );
23742
23869
  },
23743
23870
  () => {
23744
23871
  runtimeKeepalivePop();
23745
23872
  if (onerror)
23746
- ((a1) => {})(
23747
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23873
+ ((
23874
+ a1
23875
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23876
+ file
23748
23877
  );
23749
23878
  },
23750
23879
  true // don'tCreateFile - it's already there
@@ -23778,16 +23907,21 @@ export function init(RuntimeName, PHPLoader) {
23778
23907
  () => {
23779
23908
  runtimeKeepalivePop();
23780
23909
  if (onload)
23781
- ((a1, a2) => {})(
23782
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
23910
+ ((
23911
+ a1,
23912
+ a2
23913
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23914
+ arg,
23783
23915
  cname
23784
23916
  );
23785
23917
  },
23786
23918
  () => {
23787
23919
  runtimeKeepalivePop();
23788
23920
  if (onerror)
23789
- ((a1) => {})(
23790
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
23921
+ ((
23922
+ a1
23923
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23924
+ arg
23791
23925
  );
23792
23926
  },
23793
23927
  true // don'tCreateFile - it's already there
@@ -24060,10 +24194,10 @@ export function init(RuntimeName, PHPLoader) {
24060
24194
  runtimeKeepalivePop();
24061
24195
  callUserCallback(() => {
24062
24196
  var sp = stackSave();
24063
- ((a1) => {})(
24064
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
24065
- _file
24066
- )
24197
+ ((
24198
+ a1
24199
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24200
+ stringToUTF8OnStack(_file)
24067
24201
  );
24068
24202
  stackRestore(sp);
24069
24203
  });
@@ -24107,8 +24241,12 @@ export function init(RuntimeName, PHPLoader) {
24107
24241
  callUserCallback(() => {
24108
24242
  var buffer = _malloc(byteArray.length);
24109
24243
  HEAPU8.set(byteArray, buffer);
24110
- ((a1, a2, a3) => {})(
24111
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
24244
+ ((
24245
+ a1,
24246
+ a2,
24247
+ a3
24248
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24249
+ userdata,
24112
24250
  buffer,
24113
24251
  byteArray.length
24114
24252
  );
@@ -24118,8 +24256,10 @@ export function init(RuntimeName, PHPLoader) {
24118
24256
  if (onerror) {
24119
24257
  runtimeKeepalivePop();
24120
24258
  callUserCallback(() => {
24121
- ((a1) => {})(
24122
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
24259
+ ((
24260
+ a1
24261
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24262
+ userdata
24123
24263
  );
24124
24264
  });
24125
24265
  }
@@ -24176,8 +24316,12 @@ export function init(RuntimeName, PHPLoader) {
24176
24316
  );
24177
24317
  if (onload) {
24178
24318
  var sp = stackSave();
24179
- ((a1, a2, a3) => {})(
24180
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24319
+ ((
24320
+ a1,
24321
+ a2,
24322
+ a3
24323
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24324
+ handle,
24181
24325
  userdata,
24182
24326
  stringToUTF8OnStack(_file)
24183
24327
  );
@@ -24185,8 +24329,12 @@ export function init(RuntimeName, PHPLoader) {
24185
24329
  }
24186
24330
  } else {
24187
24331
  if (onerror)
24188
- ((a1, a2, a3) => {})(
24189
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24332
+ ((
24333
+ a1,
24334
+ a2,
24335
+ a3
24336
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24337
+ handle,
24190
24338
  userdata,
24191
24339
  http.status
24192
24340
  );
@@ -24199,8 +24347,12 @@ export function init(RuntimeName, PHPLoader) {
24199
24347
  http.onerror = (e) => {
24200
24348
  runtimeKeepalivePop();
24201
24349
  if (onerror)
24202
- ((a1, a2, a3) => {})(
24203
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24350
+ ((
24351
+ a1,
24352
+ a2,
24353
+ a3
24354
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24355
+ handle,
24204
24356
  userdata,
24205
24357
  http.status
24206
24358
  );
@@ -24215,8 +24367,12 @@ export function init(RuntimeName, PHPLoader) {
24215
24367
  ) {
24216
24368
  var percentComplete = (e.loaded / e.total) * 100;
24217
24369
  if (onprogress)
24218
- ((a1, a2, a3) => {})(
24219
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24370
+ ((
24371
+ a1,
24372
+ a2,
24373
+ a3
24374
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24375
+ handle,
24220
24376
  userdata,
24221
24377
  percentComplete
24222
24378
  );
@@ -24273,8 +24429,13 @@ export function init(RuntimeName, PHPLoader) {
24273
24429
  if (http.statusText) {
24274
24430
  statusText = stringToUTF8OnStack(http.statusText);
24275
24431
  }
24276
- ((a1, a2, a3, a4) => {})(
24277
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24432
+ ((
24433
+ a1,
24434
+ a2,
24435
+ a3,
24436
+ a4
24437
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24438
+ handle,
24278
24439
  userdata,
24279
24440
  http.status,
24280
24441
  statusText
@@ -24295,8 +24456,13 @@ export function init(RuntimeName, PHPLoader) {
24295
24456
  var buffer = _malloc(byteArray.length);
24296
24457
  HEAPU8.set(byteArray, buffer);
24297
24458
  if (onload)
24298
- ((a1, a2, a3, a4) => {})(
24299
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24459
+ ((
24460
+ a1,
24461
+ a2,
24462
+ a3,
24463
+ a4
24464
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24465
+ handle,
24300
24466
  userdata,
24301
24467
  buffer,
24302
24468
  byteArray.length
@@ -24317,8 +24483,13 @@ export function init(RuntimeName, PHPLoader) {
24317
24483
  // PROGRESS
24318
24484
  http.onprogress = (e) => {
24319
24485
  if (onprogress)
24320
- ((a1, a2, a3, a4) => {})(
24321
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24486
+ ((
24487
+ a1,
24488
+ a2,
24489
+ a3,
24490
+ a4
24491
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24492
+ handle,
24322
24493
  userdata,
24323
24494
  e.loaded,
24324
24495
  e.lengthComputable || e.lengthComputable === undefined
@@ -24438,16 +24609,24 @@ export function init(RuntimeName, PHPLoader) {
24438
24609
  if (event === 'error') {
24439
24610
  withStackSave(() => {
24440
24611
  var msg = stringToUTF8OnStack(data[2]);
24441
- ((a1, a2, a3, a4) => {})(
24442
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
24612
+ ((
24613
+ a1,
24614
+ a2,
24615
+ a3,
24616
+ a4
24617
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24618
+ data[0],
24443
24619
  data[1],
24444
24620
  msg,
24445
24621
  userData
24446
24622
  );
24447
24623
  });
24448
24624
  } else {
24449
- ((a1, a2) => {})(
24450
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
24625
+ ((
24626
+ a1,
24627
+ a2
24628
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24629
+ data,
24451
24630
  userData
24452
24631
  );
24453
24632
  }
@@ -24913,8 +25092,12 @@ export function init(RuntimeName, PHPLoader) {
24913
25092
  ) => {
24914
25093
  var webGlEventHandlerFunc = (e = event) => {
24915
25094
  if (
24916
- ((a1, a2, a3) => {})(
24917
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
25095
+ ((
25096
+ a1,
25097
+ a2,
25098
+ a3
25099
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25100
+ eventTypeId,
24918
25101
  0,
24919
25102
  userData
24920
25103
  )
@@ -25133,15 +25316,21 @@ export function init(RuntimeName, PHPLoader) {
25133
25316
  ) {
25134
25317
  event.preventDefault();
25135
25318
  GLUT.saveModifiers(event);
25136
- ((a1, a2) => {})(
25137
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25319
+ ((
25320
+ a1,
25321
+ a2
25322
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25323
+ lastX,
25138
25324
  lastY
25139
25325
  );
25140
25326
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
25141
25327
  event.preventDefault();
25142
25328
  GLUT.saveModifiers(event);
25143
- ((a1, a2) => {})(
25144
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25329
+ ((
25330
+ a1,
25331
+ a2
25332
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25333
+ lastX,
25145
25334
  lastY
25146
25335
  );
25147
25336
  }
@@ -25302,8 +25491,12 @@ export function init(RuntimeName, PHPLoader) {
25302
25491
  if (GLUT.specialFunc) {
25303
25492
  event.preventDefault();
25304
25493
  GLUT.saveModifiers(event);
25305
- ((a1, a2, a3) => {})(
25306
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25494
+ ((
25495
+ a1,
25496
+ a2,
25497
+ a3
25498
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25499
+ key,
25307
25500
  Browser.mouseX,
25308
25501
  Browser.mouseY
25309
25502
  );
@@ -25313,8 +25506,12 @@ export function init(RuntimeName, PHPLoader) {
25313
25506
  if (key !== null && GLUT.keyboardFunc) {
25314
25507
  event.preventDefault();
25315
25508
  GLUT.saveModifiers(event);
25316
- ((a1, a2, a3) => {})(
25317
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25509
+ ((
25510
+ a1,
25511
+ a2,
25512
+ a3
25513
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25514
+ key,
25318
25515
  Browser.mouseX,
25319
25516
  Browser.mouseY
25320
25517
  );
@@ -25329,8 +25526,12 @@ export function init(RuntimeName, PHPLoader) {
25329
25526
  if (GLUT.specialUpFunc) {
25330
25527
  event.preventDefault();
25331
25528
  GLUT.saveModifiers(event);
25332
- ((a1, a2, a3) => {})(
25333
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25529
+ ((
25530
+ a1,
25531
+ a2,
25532
+ a3
25533
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25534
+ key,
25334
25535
  Browser.mouseX,
25335
25536
  Browser.mouseY
25336
25537
  );
@@ -25340,8 +25541,12 @@ export function init(RuntimeName, PHPLoader) {
25340
25541
  if (key !== null && GLUT.keyboardUpFunc) {
25341
25542
  event.preventDefault();
25342
25543
  GLUT.saveModifiers(event);
25343
- ((a1, a2, a3) => {})(
25344
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25544
+ ((
25545
+ a1,
25546
+ a2,
25547
+ a3
25548
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25549
+ key,
25345
25550
  Browser.mouseX,
25346
25551
  Browser.mouseY
25347
25552
  );
@@ -25405,10 +25610,13 @@ export function init(RuntimeName, PHPLoader) {
25405
25610
  } catch (e) {}
25406
25611
  event.preventDefault();
25407
25612
  GLUT.saveModifiers(event);
25408
- ((a1, a2, a3, a4) => {})(
25409
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25410
- 'button'
25411
- ],
25613
+ ((
25614
+ a1,
25615
+ a2,
25616
+ a3,
25617
+ a4
25618
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25619
+ event['button'],
25412
25620
  0 /*GLUT_DOWN*/,
25413
25621
  Browser.mouseX,
25414
25622
  Browser.mouseY
@@ -25423,10 +25631,13 @@ export function init(RuntimeName, PHPLoader) {
25423
25631
  if (GLUT.mouseFunc) {
25424
25632
  event.preventDefault();
25425
25633
  GLUT.saveModifiers(event);
25426
- ((a1, a2, a3, a4) => {})(
25427
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25428
- 'button'
25429
- ],
25634
+ ((
25635
+ a1,
25636
+ a2,
25637
+ a3,
25638
+ a4
25639
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25640
+ event['button'],
25430
25641
  1 /*GLUT_UP*/,
25431
25642
  Browser.mouseX,
25432
25643
  Browser.mouseY
@@ -25455,8 +25666,13 @@ export function init(RuntimeName, PHPLoader) {
25455
25666
  if (GLUT.mouseFunc) {
25456
25667
  event.preventDefault();
25457
25668
  GLUT.saveModifiers(event);
25458
- ((a1, a2, a3, a4) => {})(
25459
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25669
+ ((
25670
+ a1,
25671
+ a2,
25672
+ a3,
25673
+ a4
25674
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25675
+ button,
25460
25676
  0 /*GLUT_DOWN*/,
25461
25677
  Browser.mouseX,
25462
25678
  Browser.mouseY
@@ -25499,8 +25715,11 @@ export function init(RuntimeName, PHPLoader) {
25499
25715
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25500
25716
  if (GLUT.reshapeFunc) {
25501
25717
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25502
- ((a1, a2) => {})(
25503
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25718
+ ((
25719
+ a1,
25720
+ a2
25721
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25722
+ width,
25504
25723
  height
25505
25724
  );
25506
25725
  }
@@ -25543,8 +25762,11 @@ export function init(RuntimeName, PHPLoader) {
25543
25762
 
25544
25763
  Browser.resizeListeners.push((width, height) => {
25545
25764
  if (GLUT.reshapeFunc) {
25546
- ((a1, a2) => {})(
25547
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25765
+ ((
25766
+ a1,
25767
+ a2
25768
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25769
+ width,
25548
25770
  height
25549
25771
  );
25550
25772
  }
@@ -25657,8 +25879,10 @@ export function init(RuntimeName, PHPLoader) {
25657
25879
  var _glutTimerFunc = (msec, func, value) =>
25658
25880
  safeSetTimeout(
25659
25881
  () =>
25660
- ((a1) => {})(
25661
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25882
+ ((
25883
+ a1
25884
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25885
+ value
25662
25886
  ),
25663
25887
  msec
25664
25888
  );
@@ -25818,8 +26042,11 @@ export function init(RuntimeName, PHPLoader) {
25818
26042
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25819
26043
  // Just call it once here.
25820
26044
  if (GLUT.reshapeFunc) {
25821
- ((a1, a2) => {})(
25822
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
26045
+ ((
26046
+ a1,
26047
+ a2
26048
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26049
+ width,
25823
26050
  height
25824
26051
  );
25825
26052
  }
@@ -26881,15 +27108,21 @@ export function init(RuntimeName, PHPLoader) {
26881
27108
  callUserCallback(() => {
26882
27109
  if (error) {
26883
27110
  if (onerror)
26884
- ((a1) => {})(
26885
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27111
+ ((
27112
+ a1
27113
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27114
+ arg
26886
27115
  );
26887
27116
  return;
26888
27117
  }
26889
27118
  var buffer = _malloc(byteArray.length);
26890
27119
  HEAPU8.set(byteArray, buffer);
26891
- ((a1, a2, a3) => {})(
26892
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27120
+ ((
27121
+ a1,
27122
+ a2,
27123
+ a3
27124
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27125
+ arg,
26893
27126
  buffer,
26894
27127
  byteArray.length
26895
27128
  );
@@ -26921,14 +27154,18 @@ export function init(RuntimeName, PHPLoader) {
26921
27154
  callUserCallback(() => {
26922
27155
  if (error) {
26923
27156
  if (onerror)
26924
- ((a1) => {})(
26925
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27157
+ ((
27158
+ a1
27159
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27160
+ arg
26926
27161
  );
26927
27162
  return;
26928
27163
  }
26929
27164
  if (onstore)
26930
- ((a1) => {})(
26931
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27165
+ ((
27166
+ a1
27167
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27168
+ arg
26932
27169
  );
26933
27170
  });
26934
27171
  }
@@ -26943,14 +27180,18 @@ export function init(RuntimeName, PHPLoader) {
26943
27180
  callUserCallback(() => {
26944
27181
  if (error) {
26945
27182
  if (onerror)
26946
- ((a1) => {})(
26947
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27183
+ ((
27184
+ a1
27185
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27186
+ arg
26948
27187
  );
26949
27188
  return;
26950
27189
  }
26951
27190
  if (ondelete)
26952
- ((a1) => {})(
26953
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27191
+ ((
27192
+ a1
27193
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27194
+ arg
26954
27195
  );
26955
27196
  });
26956
27197
  });
@@ -26967,14 +27208,19 @@ export function init(RuntimeName, PHPLoader) {
26967
27208
  callUserCallback(() => {
26968
27209
  if (error) {
26969
27210
  if (onerror)
26970
- ((a1) => {})(
26971
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27211
+ ((
27212
+ a1
27213
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27214
+ arg
26972
27215
  );
26973
27216
  return;
26974
27217
  }
26975
27218
  if (oncheck)
26976
- ((a1, a2) => {})(
26977
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27219
+ ((
27220
+ a1,
27221
+ a2
27222
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27223
+ arg,
26978
27224
  exists
26979
27225
  );
26980
27226
  });
@@ -26990,14 +27236,18 @@ export function init(RuntimeName, PHPLoader) {
26990
27236
  callUserCallback(() => {
26991
27237
  if (error) {
26992
27238
  if (onerror)
26993
- ((a1) => {})(
26994
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27239
+ ((
27240
+ a1
27241
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27242
+ arg
26995
27243
  );
26996
27244
  return;
26997
27245
  }
26998
27246
  if (onclear)
26999
- ((a1) => {})(
27000
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27247
+ ((
27248
+ a1
27249
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27250
+ arg
27001
27251
  );
27002
27252
  });
27003
27253
  });
@@ -27154,8 +27404,11 @@ export function init(RuntimeName, PHPLoader) {
27154
27404
  safeSetTimeout(() => {
27155
27405
  var stackBegin = Asyncify.currData + 12;
27156
27406
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
27157
- ((a1, a2) => {})(
27158
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27407
+ ((
27408
+ a1,
27409
+ a2
27410
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27411
+ stackBegin,
27159
27412
  stackEnd
27160
27413
  );
27161
27414
  wakeUp();
@@ -27216,8 +27469,10 @@ export function init(RuntimeName, PHPLoader) {
27216
27469
  HEAPU32[(newFiber + 12) >> 2] = 0;
27217
27470
 
27218
27471
  var userData = HEAPU32[(newFiber + 16) >> 2];
27219
- ((a1) => {})(
27220
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27472
+ ((
27473
+ a1
27474
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27475
+ userData
27221
27476
  );
27222
27477
  } else {
27223
27478
  var asyncifyData = newFiber + 20;
@@ -28229,8 +28484,11 @@ export function init(RuntimeName, PHPLoader) {
28229
28484
  if (!SDL.eventHandler) return;
28230
28485
 
28231
28486
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
28232
- ((a1, a2) => {})(
28233
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28487
+ ((
28488
+ a1,
28489
+ a2
28490
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28491
+ SDL.eventHandlerContext,
28234
28492
  SDL.eventHandlerTemp
28235
28493
  );
28236
28494
  }
@@ -29863,9 +30121,12 @@ export function init(RuntimeName, PHPLoader) {
29863
30121
  return;
29864
30122
 
29865
30123
  // Ask SDL audio data from the user code.
29866
- ((a1, a2, a3) => {})(
29867
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29868
- .audio.userdata,
30124
+ ((
30125
+ a1,
30126
+ a2,
30127
+ a3
30128
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30129
+ SDL.audio.userdata,
29869
30130
  SDL.audio.buffer,
29870
30131
  SDL.audio.bufferSize
29871
30132
  );
@@ -30323,8 +30584,10 @@ export function init(RuntimeName, PHPLoader) {
30323
30584
  info.audio = null;
30324
30585
  }
30325
30586
  if (SDL.channelFinished) {
30326
- ((a1) => {})(
30327
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30587
+ ((
30588
+ a1
30589
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30590
+ channel
30328
30591
  );
30329
30592
  }
30330
30593
  }
@@ -30393,8 +30656,10 @@ export function init(RuntimeName, PHPLoader) {
30393
30656
  channelInfo.audio = null;
30394
30657
  }
30395
30658
  if (SDL.channelFinished)
30396
- ((a1) => {})(
30397
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30659
+ ((
30660
+ a1
30661
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30662
+ channel
30398
30663
  );
30399
30664
  };
30400
30665
  if (channelInfo.audio) {
@@ -31142,8 +31407,11 @@ export function init(RuntimeName, PHPLoader) {
31142
31407
  var _SDL_AddTimer = (interval, callback, param) =>
31143
31408
  safeSetTimeout(
31144
31409
  () =>
31145
- ((a1, a2) => {})(
31146
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31410
+ ((
31411
+ a1,
31412
+ a2
31413
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31414
+ interval,
31147
31415
  param
31148
31416
  ),
31149
31417
  interval
@@ -31526,8 +31794,12 @@ export function init(RuntimeName, PHPLoader) {
31526
31794
 
31527
31795
  socket.onopen = function (e) {
31528
31796
  var eventPtr = WS.getSocketEvent(socketId);
31529
- ((a1, a2, a3) => {})(
31530
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31797
+ ((
31798
+ a1,
31799
+ a2,
31800
+ a3
31801
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31802
+ 0 /*TODO*/,
31531
31803
  eventPtr,
31532
31804
  userData
31533
31805
  );
@@ -31549,8 +31821,12 @@ export function init(RuntimeName, PHPLoader) {
31549
31821
 
31550
31822
  socket.onerror = function (e) {
31551
31823
  var eventPtr = WS.getSocketEvent(socketId);
31552
- ((a1, a2, a3) => {})(
31553
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31824
+ ((
31825
+ a1,
31826
+ a2,
31827
+ a3
31828
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31829
+ 0 /*TODO*/,
31554
31830
  eventPtr,
31555
31831
  userData
31556
31832
  );
@@ -31575,8 +31851,12 @@ export function init(RuntimeName, PHPLoader) {
31575
31851
  (HEAP8[eventPtr + 4] = e.wasClean),
31576
31852
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31577
31853
  stringToUTF8(e.reason, eventPtr + 8, 512);
31578
- ((a1, a2, a3) => {})(
31579
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31854
+ ((
31855
+ a1,
31856
+ a2,
31857
+ a3
31858
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31859
+ 0 /*TODO*/,
31580
31860
  eventPtr,
31581
31861
  userData
31582
31862
  );
@@ -31610,8 +31890,12 @@ export function init(RuntimeName, PHPLoader) {
31610
31890
  (HEAPU32[(eventPtr + 4) >> 2] = buf),
31611
31891
  (HEAP32[(eventPtr + 8) >> 2] = len),
31612
31892
  (HEAP8[eventPtr + 12] = isText),
31613
- ((a1, a2, a3) => {})(
31614
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31893
+ ((
31894
+ a1,
31895
+ a2,
31896
+ a3
31897
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31898
+ 0 /*TODO*/,
31615
31899
  eventPtr,
31616
31900
  userData
31617
31901
  );