@php-wasm/node 2.0.3 → 2.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
1774
1774
  );
1775
1775
 
1776
1776
  var ___call_sighandler = (fp, sig) =>
1777
- ((a1) => {})(
1778
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
1777
+ ((
1778
+ a1
1779
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
1780
+ sig
1779
1781
  );
1780
1782
  ___call_sighandler.sig = 'vpi';
1781
1783
 
@@ -7348,6 +7350,8 @@ export function init(RuntimeName, PHPLoader) {
7348
7350
  return -ERRNO_CODES.EBADF;
7349
7351
  }
7350
7352
 
7353
+ const flockStructAddr = syscallGetVarargP();
7354
+
7351
7355
  if (!locking.is_path_to_shared_fs(vfsPath)) {
7352
7356
  _js_wasm_trace(
7353
7357
  "fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
@@ -7363,7 +7367,6 @@ export function init(RuntimeName, PHPLoader) {
7363
7367
  return 0;
7364
7368
  }
7365
7369
 
7366
- const flockStructAddr = syscallGetVarargP();
7367
7370
  const flockStruct = read_flock_struct(flockStructAddr);
7368
7371
 
7369
7372
  if (!(flockStruct.l_type in locking.fcntlToLockState)) {
@@ -8791,8 +8794,11 @@ export function init(RuntimeName, PHPLoader) {
8791
8794
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8792
8795
  runtimeKeepalivePop();
8793
8796
  callUserCallback(() =>
8794
- ((a1, a2) => {})(
8795
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8797
+ ((
8798
+ a1,
8799
+ a2
8800
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8801
+ handle,
8796
8802
  user_data
8797
8803
  )
8798
8804
  );
@@ -8800,8 +8806,11 @@ export function init(RuntimeName, PHPLoader) {
8800
8806
  function successCallback() {
8801
8807
  runtimeKeepalivePop();
8802
8808
  callUserCallback(() =>
8803
- ((a1, a2) => {})(
8804
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8809
+ ((
8810
+ a1,
8811
+ a2
8812
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8813
+ handle,
8805
8814
  user_data
8806
8815
  )
8807
8816
  );
@@ -19469,8 +19478,11 @@ export function init(RuntimeName, PHPLoader) {
19469
19478
  var trace = getCallstack();
19470
19479
  var parts = trace.split('\n');
19471
19480
  for (var i = 0; i < parts.length; i++) {
19472
- var ret = ((a1, a2) => {})(
19473
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
19481
+ var ret = ((
19482
+ a1,
19483
+ a2
19484
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19485
+ 0,
19474
19486
  arg
19475
19487
  );
19476
19488
  if (ret !== 0) return;
@@ -20046,8 +20058,12 @@ export function init(RuntimeName, PHPLoader) {
20046
20058
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
20047
20059
 
20048
20060
  if (
20049
- ((a1, a2, a3) => {})(
20050
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20061
+ ((
20062
+ a1,
20063
+ a2,
20064
+ a3
20065
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20066
+ eventTypeId,
20051
20067
  keyEventData,
20052
20068
  userData
20053
20069
  )
@@ -20165,8 +20181,12 @@ export function init(RuntimeName, PHPLoader) {
20165
20181
  fillMouseEventData(JSEvents.mouseEvent, e, target);
20166
20182
 
20167
20183
  if (
20168
- ((a1, a2, a3) => {})(
20169
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20184
+ ((
20185
+ a1,
20186
+ a2,
20187
+ a3
20188
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20189
+ eventTypeId,
20170
20190
  JSEvents.mouseEvent,
20171
20191
  userData
20172
20192
  )
@@ -20380,8 +20400,12 @@ export function init(RuntimeName, PHPLoader) {
20380
20400
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
20381
20401
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
20382
20402
  if (
20383
- ((a1, a2, a3) => {})(
20384
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20403
+ ((
20404
+ a1,
20405
+ a2,
20406
+ a3
20407
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20408
+ eventTypeId,
20385
20409
  wheelEvent,
20386
20410
  userData
20387
20411
  )
@@ -20462,8 +20486,12 @@ export function init(RuntimeName, PHPLoader) {
20462
20486
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
20463
20487
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
20464
20488
  if (
20465
- ((a1, a2, a3) => {})(
20466
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20489
+ ((
20490
+ a1,
20491
+ a2,
20492
+ a3
20493
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20494
+ eventTypeId,
20467
20495
  uiEvent,
20468
20496
  userData
20469
20497
  )
@@ -20537,8 +20565,12 @@ export function init(RuntimeName, PHPLoader) {
20537
20565
  stringToUTF8(id, focusEvent + 128, 128);
20538
20566
 
20539
20567
  if (
20540
- ((a1, a2, a3) => {})(
20541
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20568
+ ((
20569
+ a1,
20570
+ a2,
20571
+ a3
20572
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20573
+ eventTypeId,
20542
20574
  focusEvent,
20543
20575
  userData
20544
20576
  )
@@ -20654,8 +20686,12 @@ export function init(RuntimeName, PHPLoader) {
20654
20686
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
20655
20687
 
20656
20688
  if (
20657
- ((a1, a2, a3) => {})(
20658
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20689
+ ((
20690
+ a1,
20691
+ a2,
20692
+ a3
20693
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20694
+ eventTypeId,
20659
20695
  JSEvents.deviceOrientationEvent,
20660
20696
  userData
20661
20697
  )
@@ -20738,8 +20774,12 @@ export function init(RuntimeName, PHPLoader) {
20738
20774
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
20739
20775
 
20740
20776
  if (
20741
- ((a1, a2, a3) => {})(
20742
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20777
+ ((
20778
+ a1,
20779
+ a2,
20780
+ a3
20781
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20782
+ eventTypeId,
20743
20783
  JSEvents.deviceMotionEvent,
20744
20784
  userData
20745
20785
  )
@@ -20849,8 +20889,12 @@ export function init(RuntimeName, PHPLoader) {
20849
20889
  fillOrientationChangeEventData(orientationChangeEvent);
20850
20890
 
20851
20891
  if (
20852
- ((a1, a2, a3) => {})(
20853
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20892
+ ((
20893
+ a1,
20894
+ a2,
20895
+ a3
20896
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20897
+ eventTypeId,
20854
20898
  orientationChangeEvent,
20855
20899
  userData
20856
20900
  )
@@ -20983,8 +21027,12 @@ export function init(RuntimeName, PHPLoader) {
20983
21027
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20984
21028
 
20985
21029
  if (
20986
- ((a1, a2, a3) => {})(
20987
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21030
+ ((
21031
+ a1,
21032
+ a2,
21033
+ a3
21034
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21035
+ eventTypeId,
20988
21036
  fullscreenChangeEvent,
20989
21037
  userData
20990
21038
  )
@@ -21148,8 +21196,12 @@ export function init(RuntimeName, PHPLoader) {
21148
21196
  );
21149
21197
 
21150
21198
  if (currentFullscreenStrategy.canvasResizedCallback) {
21151
- ((a1, a2, a3) => {})(
21152
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21199
+ ((
21200
+ a1,
21201
+ a2,
21202
+ a3
21203
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21204
+ 37,
21153
21205
  0,
21154
21206
  currentFullscreenStrategy.canvasResizedCallbackUserData
21155
21207
  );
@@ -21255,8 +21307,12 @@ export function init(RuntimeName, PHPLoader) {
21255
21307
  currentFullscreenStrategy = strategy;
21256
21308
 
21257
21309
  if (strategy.canvasResizedCallback) {
21258
- ((a1, a2, a3) => {})(
21259
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21310
+ ((
21311
+ a1,
21312
+ a2,
21313
+ a3
21314
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21315
+ 37,
21260
21316
  0,
21261
21317
  strategy.canvasResizedCallbackUserData
21262
21318
  );
@@ -21358,8 +21414,12 @@ export function init(RuntimeName, PHPLoader) {
21358
21414
  !inCenteredWithoutScalingFullscreenMode &&
21359
21415
  currentFullscreenStrategy.canvasResizedCallback
21360
21416
  ) {
21361
- ((a1, a2, a3) => {})(
21362
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21417
+ ((
21418
+ a1,
21419
+ a2,
21420
+ a3
21421
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21422
+ 37,
21363
21423
  0,
21364
21424
  currentFullscreenStrategy.canvasResizedCallbackUserData
21365
21425
  );
@@ -21458,8 +21518,12 @@ export function init(RuntimeName, PHPLoader) {
21458
21518
  softFullscreenResizeWebGLRenderTarget
21459
21519
  );
21460
21520
  if (strategy.canvasResizedCallback) {
21461
- ((a1, a2, a3) => {})(
21462
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21521
+ ((
21522
+ a1,
21523
+ a2,
21524
+ a3
21525
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21526
+ 37,
21463
21527
  0,
21464
21528
  strategy.canvasResizedCallbackUserData
21465
21529
  );
@@ -21472,8 +21536,12 @@ export function init(RuntimeName, PHPLoader) {
21472
21536
 
21473
21537
  // Inform the caller that the canvas size has changed.
21474
21538
  if (strategy.canvasResizedCallback) {
21475
- ((a1, a2, a3) => {})(
21476
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21539
+ ((
21540
+ a1,
21541
+ a2,
21542
+ a3
21543
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21544
+ 37,
21477
21545
  0,
21478
21546
  strategy.canvasResizedCallbackUserData
21479
21547
  );
@@ -21541,8 +21609,12 @@ export function init(RuntimeName, PHPLoader) {
21541
21609
  fillPointerlockChangeEventData(pointerlockChangeEvent);
21542
21610
 
21543
21611
  if (
21544
- ((a1, a2, a3) => {})(
21545
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21612
+ ((
21613
+ a1,
21614
+ a2,
21615
+ a3
21616
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21617
+ eventTypeId,
21546
21618
  pointerlockChangeEvent,
21547
21619
  userData
21548
21620
  )
@@ -21632,8 +21704,12 @@ export function init(RuntimeName, PHPLoader) {
21632
21704
  ) => {
21633
21705
  var pointerlockErrorEventHandlerFunc = (e = event) => {
21634
21706
  if (
21635
- ((a1, a2, a3) => {})(
21636
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21707
+ ((
21708
+ a1,
21709
+ a2,
21710
+ a3
21711
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21712
+ eventTypeId,
21637
21713
  0,
21638
21714
  userData
21639
21715
  )
@@ -21833,8 +21909,12 @@ export function init(RuntimeName, PHPLoader) {
21833
21909
  fillVisibilityChangeEventData(visibilityChangeEvent);
21834
21910
 
21835
21911
  if (
21836
- ((a1, a2, a3) => {})(
21837
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21912
+ ((
21913
+ a1,
21914
+ a2,
21915
+ a3
21916
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21917
+ eventTypeId,
21838
21918
  visibilityChangeEvent,
21839
21919
  userData
21840
21920
  )
@@ -21954,8 +22034,12 @@ export function init(RuntimeName, PHPLoader) {
21954
22034
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21955
22035
 
21956
22036
  if (
21957
- ((a1, a2, a3) => {})(
21958
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22037
+ ((
22038
+ a1,
22039
+ a2,
22040
+ a3
22041
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22042
+ eventTypeId,
21959
22043
  touchEvent,
21960
22044
  userData
21961
22045
  )
@@ -22093,8 +22177,12 @@ export function init(RuntimeName, PHPLoader) {
22093
22177
  fillGamepadEventData(gamepadEvent, e['gamepad']);
22094
22178
 
22095
22179
  if (
22096
- ((a1, a2, a3) => {})(
22097
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22180
+ ((
22181
+ a1,
22182
+ a2,
22183
+ a3
22184
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22185
+ eventTypeId,
22098
22186
  gamepadEvent,
22099
22187
  userData
22100
22188
  )
@@ -22196,8 +22284,12 @@ export function init(RuntimeName, PHPLoader) {
22196
22284
  ) => {
22197
22285
  var beforeUnloadEventHandlerFunc = (e = event) => {
22198
22286
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
22199
- var confirmationMessage = ((a1, a2, a3) => {})(
22200
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22287
+ var confirmationMessage = ((
22288
+ a1,
22289
+ a2,
22290
+ a3
22291
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22292
+ eventTypeId,
22201
22293
  0,
22202
22294
  userData
22203
22295
  );
@@ -22268,8 +22360,12 @@ export function init(RuntimeName, PHPLoader) {
22268
22360
  fillBatteryEventData(batteryEvent, battery());
22269
22361
 
22270
22362
  if (
22271
- ((a1, a2, a3) => {})(
22272
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22363
+ ((
22364
+ a1,
22365
+ a2,
22366
+ a3
22367
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22368
+ eventTypeId,
22273
22369
  batteryEvent,
22274
22370
  userData
22275
22371
  )
@@ -22359,8 +22455,11 @@ export function init(RuntimeName, PHPLoader) {
22359
22455
 
22360
22456
  var _emscripten_request_animation_frame = (cb, userData) =>
22361
22457
  requestAnimationFrame((timeStamp) =>
22362
- ((a1, a2) => {})(
22363
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22458
+ ((
22459
+ a1,
22460
+ a2
22461
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22462
+ timeStamp,
22364
22463
  userData
22365
22464
  )
22366
22465
  );
@@ -22372,8 +22471,11 @@ export function init(RuntimeName, PHPLoader) {
22372
22471
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
22373
22472
  function tick(timeStamp) {
22374
22473
  if (
22375
- ((a1, a2) => {})(
22376
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22474
+ ((
22475
+ a1,
22476
+ a2
22477
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22478
+ timeStamp,
22377
22479
  userData
22378
22480
  )
22379
22481
  ) {
@@ -22598,8 +22700,10 @@ export function init(RuntimeName, PHPLoader) {
22598
22700
  return emSetImmediate(() => {
22599
22701
  runtimeKeepalivePop();
22600
22702
  callUserCallback(() =>
22601
- ((a1) => {})(
22602
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22703
+ ((
22704
+ a1
22705
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22706
+ userData
22603
22707
  )
22604
22708
  );
22605
22709
  });
@@ -22616,8 +22720,10 @@ export function init(RuntimeName, PHPLoader) {
22616
22720
  function tick() {
22617
22721
  callUserCallback(() => {
22618
22722
  if (
22619
- ((a1) => {})(
22620
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22723
+ ((
22724
+ a1
22725
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22726
+ userData
22621
22727
  )
22622
22728
  ) {
22623
22729
  emSetImmediate(tick);
@@ -22634,8 +22740,10 @@ export function init(RuntimeName, PHPLoader) {
22634
22740
  var _emscripten_set_timeout = (cb, msecs, userData) =>
22635
22741
  safeSetTimeout(
22636
22742
  () =>
22637
- ((a1) => {})(
22638
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22743
+ ((
22744
+ a1
22745
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22746
+ userData
22639
22747
  ),
22640
22748
  msecs
22641
22749
  );
@@ -22651,8 +22759,11 @@ export function init(RuntimeName, PHPLoader) {
22651
22759
  runtimeKeepalivePop();
22652
22760
  callUserCallback(() => {
22653
22761
  if (
22654
- ((a1, a2) => {})(
22655
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
22762
+ ((
22763
+ a1,
22764
+ a2
22765
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22766
+ t,
22656
22767
  userData
22657
22768
  )
22658
22769
  ) {
@@ -22676,8 +22787,10 @@ export function init(RuntimeName, PHPLoader) {
22676
22787
  runtimeKeepalivePush();
22677
22788
  return setInterval(() => {
22678
22789
  callUserCallback(() =>
22679
- ((a1) => {})(
22680
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22790
+ ((
22791
+ a1
22792
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22793
+ userData
22681
22794
  )
22682
22795
  );
22683
22796
  }, msecs);
@@ -22692,8 +22805,10 @@ export function init(RuntimeName, PHPLoader) {
22692
22805
 
22693
22806
  var _emscripten_async_call = (func, arg, millis) => {
22694
22807
  var wrapper = () =>
22695
- ((a1) => {})(
22696
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22808
+ ((
22809
+ a1
22810
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22811
+ arg
22697
22812
  );
22698
22813
 
22699
22814
  if (
@@ -22726,7 +22841,7 @@ export function init(RuntimeName, PHPLoader) {
22726
22841
 
22727
22842
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
22728
22843
  var iterFunc =
22729
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
22844
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
22730
22845
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
22731
22846
  };
22732
22847
  _emscripten_set_main_loop.sig = 'vpii';
@@ -22738,8 +22853,10 @@ export function init(RuntimeName, PHPLoader) {
22738
22853
  simulateInfiniteLoop
22739
22854
  ) => {
22740
22855
  var iterFunc = () =>
22741
- ((a1) => {})(
22742
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22856
+ ((
22857
+ a1
22858
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22859
+ arg
22743
22860
  );
22744
22861
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
22745
22862
  };
@@ -22760,8 +22877,10 @@ export function init(RuntimeName, PHPLoader) {
22760
22877
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
22761
22878
  MainLoop.queue.push({
22762
22879
  func: () => {
22763
- ((a1) => {})(
22764
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22880
+ ((
22881
+ a1
22882
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22883
+ arg
22765
22884
  );
22766
22885
  },
22767
22886
  name: UTF8ToString(name),
@@ -22774,8 +22893,10 @@ export function init(RuntimeName, PHPLoader) {
22774
22893
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
22775
22894
  MainLoop.queue.push({
22776
22895
  func: () => {
22777
- ((a1) => {})(
22778
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22896
+ ((
22897
+ a1
22898
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22899
+ arg
22779
22900
  );
22780
22901
  },
22781
22902
  name: UTF8ToString(name),
@@ -22809,8 +22930,12 @@ export function init(RuntimeName, PHPLoader) {
22809
22930
  var resultPtr = stackAlloc(POINTER_SIZE);
22810
22931
  HEAPU32[resultPtr >> 2] = 0;
22811
22932
  try {
22812
- var result = ((a1, a2, a3) => {})(
22813
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22933
+ var result = ((
22934
+ a1,
22935
+ a2,
22936
+ a3
22937
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22938
+ resultPtr,
22814
22939
  userData,
22815
22940
  value
22816
22941
  );
@@ -23746,15 +23871,19 @@ export function init(RuntimeName, PHPLoader) {
23746
23871
  () => {
23747
23872
  runtimeKeepalivePop();
23748
23873
  if (onload)
23749
- ((a1) => {})(
23750
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23874
+ ((
23875
+ a1
23876
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23877
+ file
23751
23878
  );
23752
23879
  },
23753
23880
  () => {
23754
23881
  runtimeKeepalivePop();
23755
23882
  if (onerror)
23756
- ((a1) => {})(
23757
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23883
+ ((
23884
+ a1
23885
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23886
+ file
23758
23887
  );
23759
23888
  },
23760
23889
  true // don'tCreateFile - it's already there
@@ -23788,16 +23917,21 @@ export function init(RuntimeName, PHPLoader) {
23788
23917
  () => {
23789
23918
  runtimeKeepalivePop();
23790
23919
  if (onload)
23791
- ((a1, a2) => {})(
23792
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
23920
+ ((
23921
+ a1,
23922
+ a2
23923
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23924
+ arg,
23793
23925
  cname
23794
23926
  );
23795
23927
  },
23796
23928
  () => {
23797
23929
  runtimeKeepalivePop();
23798
23930
  if (onerror)
23799
- ((a1) => {})(
23800
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
23931
+ ((
23932
+ a1
23933
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23934
+ arg
23801
23935
  );
23802
23936
  },
23803
23937
  true // don'tCreateFile - it's already there
@@ -24070,10 +24204,10 @@ export function init(RuntimeName, PHPLoader) {
24070
24204
  runtimeKeepalivePop();
24071
24205
  callUserCallback(() => {
24072
24206
  var sp = stackSave();
24073
- ((a1) => {})(
24074
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
24075
- _file
24076
- )
24207
+ ((
24208
+ a1
24209
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24210
+ stringToUTF8OnStack(_file)
24077
24211
  );
24078
24212
  stackRestore(sp);
24079
24213
  });
@@ -24117,8 +24251,12 @@ export function init(RuntimeName, PHPLoader) {
24117
24251
  callUserCallback(() => {
24118
24252
  var buffer = _malloc(byteArray.length);
24119
24253
  HEAPU8.set(byteArray, buffer);
24120
- ((a1, a2, a3) => {})(
24121
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
24254
+ ((
24255
+ a1,
24256
+ a2,
24257
+ a3
24258
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24259
+ userdata,
24122
24260
  buffer,
24123
24261
  byteArray.length
24124
24262
  );
@@ -24128,8 +24266,10 @@ export function init(RuntimeName, PHPLoader) {
24128
24266
  if (onerror) {
24129
24267
  runtimeKeepalivePop();
24130
24268
  callUserCallback(() => {
24131
- ((a1) => {})(
24132
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
24269
+ ((
24270
+ a1
24271
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24272
+ userdata
24133
24273
  );
24134
24274
  });
24135
24275
  }
@@ -24186,8 +24326,12 @@ export function init(RuntimeName, PHPLoader) {
24186
24326
  );
24187
24327
  if (onload) {
24188
24328
  var sp = stackSave();
24189
- ((a1, a2, a3) => {})(
24190
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24329
+ ((
24330
+ a1,
24331
+ a2,
24332
+ a3
24333
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24334
+ handle,
24191
24335
  userdata,
24192
24336
  stringToUTF8OnStack(_file)
24193
24337
  );
@@ -24195,8 +24339,12 @@ export function init(RuntimeName, PHPLoader) {
24195
24339
  }
24196
24340
  } else {
24197
24341
  if (onerror)
24198
- ((a1, a2, a3) => {})(
24199
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24342
+ ((
24343
+ a1,
24344
+ a2,
24345
+ a3
24346
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24347
+ handle,
24200
24348
  userdata,
24201
24349
  http.status
24202
24350
  );
@@ -24209,8 +24357,12 @@ export function init(RuntimeName, PHPLoader) {
24209
24357
  http.onerror = (e) => {
24210
24358
  runtimeKeepalivePop();
24211
24359
  if (onerror)
24212
- ((a1, a2, a3) => {})(
24213
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24360
+ ((
24361
+ a1,
24362
+ a2,
24363
+ a3
24364
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24365
+ handle,
24214
24366
  userdata,
24215
24367
  http.status
24216
24368
  );
@@ -24225,8 +24377,12 @@ export function init(RuntimeName, PHPLoader) {
24225
24377
  ) {
24226
24378
  var percentComplete = (e.loaded / e.total) * 100;
24227
24379
  if (onprogress)
24228
- ((a1, a2, a3) => {})(
24229
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24380
+ ((
24381
+ a1,
24382
+ a2,
24383
+ a3
24384
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24385
+ handle,
24230
24386
  userdata,
24231
24387
  percentComplete
24232
24388
  );
@@ -24283,8 +24439,13 @@ export function init(RuntimeName, PHPLoader) {
24283
24439
  if (http.statusText) {
24284
24440
  statusText = stringToUTF8OnStack(http.statusText);
24285
24441
  }
24286
- ((a1, a2, a3, a4) => {})(
24287
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24442
+ ((
24443
+ a1,
24444
+ a2,
24445
+ a3,
24446
+ a4
24447
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24448
+ handle,
24288
24449
  userdata,
24289
24450
  http.status,
24290
24451
  statusText
@@ -24305,8 +24466,13 @@ export function init(RuntimeName, PHPLoader) {
24305
24466
  var buffer = _malloc(byteArray.length);
24306
24467
  HEAPU8.set(byteArray, buffer);
24307
24468
  if (onload)
24308
- ((a1, a2, a3, a4) => {})(
24309
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24469
+ ((
24470
+ a1,
24471
+ a2,
24472
+ a3,
24473
+ a4
24474
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24475
+ handle,
24310
24476
  userdata,
24311
24477
  buffer,
24312
24478
  byteArray.length
@@ -24327,8 +24493,13 @@ export function init(RuntimeName, PHPLoader) {
24327
24493
  // PROGRESS
24328
24494
  http.onprogress = (e) => {
24329
24495
  if (onprogress)
24330
- ((a1, a2, a3, a4) => {})(
24331
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24496
+ ((
24497
+ a1,
24498
+ a2,
24499
+ a3,
24500
+ a4
24501
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24502
+ handle,
24332
24503
  userdata,
24333
24504
  e.loaded,
24334
24505
  e.lengthComputable || e.lengthComputable === undefined
@@ -24448,16 +24619,24 @@ export function init(RuntimeName, PHPLoader) {
24448
24619
  if (event === 'error') {
24449
24620
  withStackSave(() => {
24450
24621
  var msg = stringToUTF8OnStack(data[2]);
24451
- ((a1, a2, a3, a4) => {})(
24452
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
24622
+ ((
24623
+ a1,
24624
+ a2,
24625
+ a3,
24626
+ a4
24627
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24628
+ data[0],
24453
24629
  data[1],
24454
24630
  msg,
24455
24631
  userData
24456
24632
  );
24457
24633
  });
24458
24634
  } else {
24459
- ((a1, a2) => {})(
24460
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
24635
+ ((
24636
+ a1,
24637
+ a2
24638
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24639
+ data,
24461
24640
  userData
24462
24641
  );
24463
24642
  }
@@ -24923,8 +25102,12 @@ export function init(RuntimeName, PHPLoader) {
24923
25102
  ) => {
24924
25103
  var webGlEventHandlerFunc = (e = event) => {
24925
25104
  if (
24926
- ((a1, a2, a3) => {})(
24927
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
25105
+ ((
25106
+ a1,
25107
+ a2,
25108
+ a3
25109
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25110
+ eventTypeId,
24928
25111
  0,
24929
25112
  userData
24930
25113
  )
@@ -25143,15 +25326,21 @@ export function init(RuntimeName, PHPLoader) {
25143
25326
  ) {
25144
25327
  event.preventDefault();
25145
25328
  GLUT.saveModifiers(event);
25146
- ((a1, a2) => {})(
25147
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25329
+ ((
25330
+ a1,
25331
+ a2
25332
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25333
+ lastX,
25148
25334
  lastY
25149
25335
  );
25150
25336
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
25151
25337
  event.preventDefault();
25152
25338
  GLUT.saveModifiers(event);
25153
- ((a1, a2) => {})(
25154
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25339
+ ((
25340
+ a1,
25341
+ a2
25342
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25343
+ lastX,
25155
25344
  lastY
25156
25345
  );
25157
25346
  }
@@ -25312,8 +25501,12 @@ export function init(RuntimeName, PHPLoader) {
25312
25501
  if (GLUT.specialFunc) {
25313
25502
  event.preventDefault();
25314
25503
  GLUT.saveModifiers(event);
25315
- ((a1, a2, a3) => {})(
25316
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25504
+ ((
25505
+ a1,
25506
+ a2,
25507
+ a3
25508
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25509
+ key,
25317
25510
  Browser.mouseX,
25318
25511
  Browser.mouseY
25319
25512
  );
@@ -25323,8 +25516,12 @@ export function init(RuntimeName, PHPLoader) {
25323
25516
  if (key !== null && GLUT.keyboardFunc) {
25324
25517
  event.preventDefault();
25325
25518
  GLUT.saveModifiers(event);
25326
- ((a1, a2, a3) => {})(
25327
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25519
+ ((
25520
+ a1,
25521
+ a2,
25522
+ a3
25523
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25524
+ key,
25328
25525
  Browser.mouseX,
25329
25526
  Browser.mouseY
25330
25527
  );
@@ -25339,8 +25536,12 @@ export function init(RuntimeName, PHPLoader) {
25339
25536
  if (GLUT.specialUpFunc) {
25340
25537
  event.preventDefault();
25341
25538
  GLUT.saveModifiers(event);
25342
- ((a1, a2, a3) => {})(
25343
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25539
+ ((
25540
+ a1,
25541
+ a2,
25542
+ a3
25543
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25544
+ key,
25344
25545
  Browser.mouseX,
25345
25546
  Browser.mouseY
25346
25547
  );
@@ -25350,8 +25551,12 @@ export function init(RuntimeName, PHPLoader) {
25350
25551
  if (key !== null && GLUT.keyboardUpFunc) {
25351
25552
  event.preventDefault();
25352
25553
  GLUT.saveModifiers(event);
25353
- ((a1, a2, a3) => {})(
25354
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25554
+ ((
25555
+ a1,
25556
+ a2,
25557
+ a3
25558
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25559
+ key,
25355
25560
  Browser.mouseX,
25356
25561
  Browser.mouseY
25357
25562
  );
@@ -25415,10 +25620,13 @@ export function init(RuntimeName, PHPLoader) {
25415
25620
  } catch (e) {}
25416
25621
  event.preventDefault();
25417
25622
  GLUT.saveModifiers(event);
25418
- ((a1, a2, a3, a4) => {})(
25419
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25420
- 'button'
25421
- ],
25623
+ ((
25624
+ a1,
25625
+ a2,
25626
+ a3,
25627
+ a4
25628
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25629
+ event['button'],
25422
25630
  0 /*GLUT_DOWN*/,
25423
25631
  Browser.mouseX,
25424
25632
  Browser.mouseY
@@ -25433,10 +25641,13 @@ export function init(RuntimeName, PHPLoader) {
25433
25641
  if (GLUT.mouseFunc) {
25434
25642
  event.preventDefault();
25435
25643
  GLUT.saveModifiers(event);
25436
- ((a1, a2, a3, a4) => {})(
25437
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25438
- 'button'
25439
- ],
25644
+ ((
25645
+ a1,
25646
+ a2,
25647
+ a3,
25648
+ a4
25649
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25650
+ event['button'],
25440
25651
  1 /*GLUT_UP*/,
25441
25652
  Browser.mouseX,
25442
25653
  Browser.mouseY
@@ -25465,8 +25676,13 @@ export function init(RuntimeName, PHPLoader) {
25465
25676
  if (GLUT.mouseFunc) {
25466
25677
  event.preventDefault();
25467
25678
  GLUT.saveModifiers(event);
25468
- ((a1, a2, a3, a4) => {})(
25469
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25679
+ ((
25680
+ a1,
25681
+ a2,
25682
+ a3,
25683
+ a4
25684
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25685
+ button,
25470
25686
  0 /*GLUT_DOWN*/,
25471
25687
  Browser.mouseX,
25472
25688
  Browser.mouseY
@@ -25509,8 +25725,11 @@ export function init(RuntimeName, PHPLoader) {
25509
25725
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25510
25726
  if (GLUT.reshapeFunc) {
25511
25727
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25512
- ((a1, a2) => {})(
25513
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25728
+ ((
25729
+ a1,
25730
+ a2
25731
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25732
+ width,
25514
25733
  height
25515
25734
  );
25516
25735
  }
@@ -25553,8 +25772,11 @@ export function init(RuntimeName, PHPLoader) {
25553
25772
 
25554
25773
  Browser.resizeListeners.push((width, height) => {
25555
25774
  if (GLUT.reshapeFunc) {
25556
- ((a1, a2) => {})(
25557
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25775
+ ((
25776
+ a1,
25777
+ a2
25778
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25779
+ width,
25558
25780
  height
25559
25781
  );
25560
25782
  }
@@ -25667,8 +25889,10 @@ export function init(RuntimeName, PHPLoader) {
25667
25889
  var _glutTimerFunc = (msec, func, value) =>
25668
25890
  safeSetTimeout(
25669
25891
  () =>
25670
- ((a1) => {})(
25671
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25892
+ ((
25893
+ a1
25894
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25895
+ value
25672
25896
  ),
25673
25897
  msec
25674
25898
  );
@@ -25828,8 +26052,11 @@ export function init(RuntimeName, PHPLoader) {
25828
26052
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25829
26053
  // Just call it once here.
25830
26054
  if (GLUT.reshapeFunc) {
25831
- ((a1, a2) => {})(
25832
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
26055
+ ((
26056
+ a1,
26057
+ a2
26058
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26059
+ width,
25833
26060
  height
25834
26061
  );
25835
26062
  }
@@ -26891,15 +27118,21 @@ export function init(RuntimeName, PHPLoader) {
26891
27118
  callUserCallback(() => {
26892
27119
  if (error) {
26893
27120
  if (onerror)
26894
- ((a1) => {})(
26895
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27121
+ ((
27122
+ a1
27123
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27124
+ arg
26896
27125
  );
26897
27126
  return;
26898
27127
  }
26899
27128
  var buffer = _malloc(byteArray.length);
26900
27129
  HEAPU8.set(byteArray, buffer);
26901
- ((a1, a2, a3) => {})(
26902
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27130
+ ((
27131
+ a1,
27132
+ a2,
27133
+ a3
27134
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27135
+ arg,
26903
27136
  buffer,
26904
27137
  byteArray.length
26905
27138
  );
@@ -26931,14 +27164,18 @@ export function init(RuntimeName, PHPLoader) {
26931
27164
  callUserCallback(() => {
26932
27165
  if (error) {
26933
27166
  if (onerror)
26934
- ((a1) => {})(
26935
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27167
+ ((
27168
+ a1
27169
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27170
+ arg
26936
27171
  );
26937
27172
  return;
26938
27173
  }
26939
27174
  if (onstore)
26940
- ((a1) => {})(
26941
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27175
+ ((
27176
+ a1
27177
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27178
+ arg
26942
27179
  );
26943
27180
  });
26944
27181
  }
@@ -26953,14 +27190,18 @@ export function init(RuntimeName, PHPLoader) {
26953
27190
  callUserCallback(() => {
26954
27191
  if (error) {
26955
27192
  if (onerror)
26956
- ((a1) => {})(
26957
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27193
+ ((
27194
+ a1
27195
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27196
+ arg
26958
27197
  );
26959
27198
  return;
26960
27199
  }
26961
27200
  if (ondelete)
26962
- ((a1) => {})(
26963
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27201
+ ((
27202
+ a1
27203
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27204
+ arg
26964
27205
  );
26965
27206
  });
26966
27207
  });
@@ -26977,14 +27218,19 @@ export function init(RuntimeName, PHPLoader) {
26977
27218
  callUserCallback(() => {
26978
27219
  if (error) {
26979
27220
  if (onerror)
26980
- ((a1) => {})(
26981
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27221
+ ((
27222
+ a1
27223
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27224
+ arg
26982
27225
  );
26983
27226
  return;
26984
27227
  }
26985
27228
  if (oncheck)
26986
- ((a1, a2) => {})(
26987
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27229
+ ((
27230
+ a1,
27231
+ a2
27232
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27233
+ arg,
26988
27234
  exists
26989
27235
  );
26990
27236
  });
@@ -27000,14 +27246,18 @@ export function init(RuntimeName, PHPLoader) {
27000
27246
  callUserCallback(() => {
27001
27247
  if (error) {
27002
27248
  if (onerror)
27003
- ((a1) => {})(
27004
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27249
+ ((
27250
+ a1
27251
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27252
+ arg
27005
27253
  );
27006
27254
  return;
27007
27255
  }
27008
27256
  if (onclear)
27009
- ((a1) => {})(
27010
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27257
+ ((
27258
+ a1
27259
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27260
+ arg
27011
27261
  );
27012
27262
  });
27013
27263
  });
@@ -27164,8 +27414,11 @@ export function init(RuntimeName, PHPLoader) {
27164
27414
  safeSetTimeout(() => {
27165
27415
  var stackBegin = Asyncify.currData + 12;
27166
27416
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
27167
- ((a1, a2) => {})(
27168
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27417
+ ((
27418
+ a1,
27419
+ a2
27420
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27421
+ stackBegin,
27169
27422
  stackEnd
27170
27423
  );
27171
27424
  wakeUp();
@@ -27226,8 +27479,10 @@ export function init(RuntimeName, PHPLoader) {
27226
27479
  HEAPU32[(newFiber + 12) >> 2] = 0;
27227
27480
 
27228
27481
  var userData = HEAPU32[(newFiber + 16) >> 2];
27229
- ((a1) => {})(
27230
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27482
+ ((
27483
+ a1
27484
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27485
+ userData
27231
27486
  );
27232
27487
  } else {
27233
27488
  var asyncifyData = newFiber + 20;
@@ -28239,8 +28494,11 @@ export function init(RuntimeName, PHPLoader) {
28239
28494
  if (!SDL.eventHandler) return;
28240
28495
 
28241
28496
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
28242
- ((a1, a2) => {})(
28243
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28497
+ ((
28498
+ a1,
28499
+ a2
28500
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28501
+ SDL.eventHandlerContext,
28244
28502
  SDL.eventHandlerTemp
28245
28503
  );
28246
28504
  }
@@ -29873,9 +30131,12 @@ export function init(RuntimeName, PHPLoader) {
29873
30131
  return;
29874
30132
 
29875
30133
  // Ask SDL audio data from the user code.
29876
- ((a1, a2, a3) => {})(
29877
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29878
- .audio.userdata,
30134
+ ((
30135
+ a1,
30136
+ a2,
30137
+ a3
30138
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30139
+ SDL.audio.userdata,
29879
30140
  SDL.audio.buffer,
29880
30141
  SDL.audio.bufferSize
29881
30142
  );
@@ -30333,8 +30594,10 @@ export function init(RuntimeName, PHPLoader) {
30333
30594
  info.audio = null;
30334
30595
  }
30335
30596
  if (SDL.channelFinished) {
30336
- ((a1) => {})(
30337
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30597
+ ((
30598
+ a1
30599
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30600
+ channel
30338
30601
  );
30339
30602
  }
30340
30603
  }
@@ -30403,8 +30666,10 @@ export function init(RuntimeName, PHPLoader) {
30403
30666
  channelInfo.audio = null;
30404
30667
  }
30405
30668
  if (SDL.channelFinished)
30406
- ((a1) => {})(
30407
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30669
+ ((
30670
+ a1
30671
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30672
+ channel
30408
30673
  );
30409
30674
  };
30410
30675
  if (channelInfo.audio) {
@@ -31152,8 +31417,11 @@ export function init(RuntimeName, PHPLoader) {
31152
31417
  var _SDL_AddTimer = (interval, callback, param) =>
31153
31418
  safeSetTimeout(
31154
31419
  () =>
31155
- ((a1, a2) => {})(
31156
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31420
+ ((
31421
+ a1,
31422
+ a2
31423
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31424
+ interval,
31157
31425
  param
31158
31426
  ),
31159
31427
  interval
@@ -31526,8 +31794,12 @@ export function init(RuntimeName, PHPLoader) {
31526
31794
 
31527
31795
  socket.onopen = function (e) {
31528
31796
  var eventPtr = WS.getSocketEvent(socketId);
31529
- ((a1, a2, a3) => {})(
31530
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31797
+ ((
31798
+ a1,
31799
+ a2,
31800
+ a3
31801
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31802
+ 0 /*TODO*/,
31531
31803
  eventPtr,
31532
31804
  userData
31533
31805
  );
@@ -31549,8 +31821,12 @@ export function init(RuntimeName, PHPLoader) {
31549
31821
 
31550
31822
  socket.onerror = function (e) {
31551
31823
  var eventPtr = WS.getSocketEvent(socketId);
31552
- ((a1, a2, a3) => {})(
31553
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31824
+ ((
31825
+ a1,
31826
+ a2,
31827
+ a3
31828
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31829
+ 0 /*TODO*/,
31554
31830
  eventPtr,
31555
31831
  userData
31556
31832
  );
@@ -31575,8 +31851,12 @@ export function init(RuntimeName, PHPLoader) {
31575
31851
  (HEAP8[eventPtr + 4] = e.wasClean),
31576
31852
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31577
31853
  stringToUTF8(e.reason, eventPtr + 8, 512);
31578
- ((a1, a2, a3) => {})(
31579
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31854
+ ((
31855
+ a1,
31856
+ a2,
31857
+ a3
31858
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31859
+ 0 /*TODO*/,
31580
31860
  eventPtr,
31581
31861
  userData
31582
31862
  );
@@ -31610,8 +31890,12 @@ export function init(RuntimeName, PHPLoader) {
31610
31890
  (HEAPU32[(eventPtr + 4) >> 2] = buf),
31611
31891
  (HEAP32[(eventPtr + 8) >> 2] = len),
31612
31892
  (HEAP8[eventPtr + 12] = isText),
31613
- ((a1, a2, a3) => {})(
31614
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31893
+ ((
31894
+ a1,
31895
+ a2,
31896
+ a3
31897
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31898
+ 0 /*TODO*/,
31615
31899
  eventPtr,
31616
31900
  userData
31617
31901
  );