@php-wasm/node 2.0.3 → 2.0.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
1774
1774
  );
1775
1775
 
1776
1776
  var ___call_sighandler = (fp, sig) =>
1777
- ((a1) => {})(
1778
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
1777
+ ((
1778
+ a1
1779
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
1780
+ sig
1779
1781
  );
1780
1782
  ___call_sighandler.sig = 'vpi';
1781
1783
 
@@ -7348,6 +7350,8 @@ export function init(RuntimeName, PHPLoader) {
7348
7350
  return -ERRNO_CODES.EBADF;
7349
7351
  }
7350
7352
 
7353
+ const flockStructAddr = syscallGetVarargP();
7354
+
7351
7355
  if (!locking.is_path_to_shared_fs(vfsPath)) {
7352
7356
  _js_wasm_trace(
7353
7357
  "fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
@@ -7363,7 +7367,6 @@ export function init(RuntimeName, PHPLoader) {
7363
7367
  return 0;
7364
7368
  }
7365
7369
 
7366
- const flockStructAddr = syscallGetVarargP();
7367
7370
  const flockStruct = read_flock_struct(flockStructAddr);
7368
7371
 
7369
7372
  if (!(flockStruct.l_type in locking.fcntlToLockState)) {
@@ -8791,8 +8794,11 @@ export function init(RuntimeName, PHPLoader) {
8791
8794
  dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
8792
8795
  runtimeKeepalivePop();
8793
8796
  callUserCallback(() =>
8794
- ((a1, a2) => {})(
8795
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8797
+ ((
8798
+ a1,
8799
+ a2
8800
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8801
+ handle,
8796
8802
  user_data
8797
8803
  )
8798
8804
  );
@@ -8800,8 +8806,11 @@ export function init(RuntimeName, PHPLoader) {
8800
8806
  function successCallback() {
8801
8807
  runtimeKeepalivePop();
8802
8808
  callUserCallback(() =>
8803
- ((a1, a2) => {})(
8804
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
8809
+ ((
8810
+ a1,
8811
+ a2
8812
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
8813
+ handle,
8805
8814
  user_data
8806
8815
  )
8807
8816
  );
@@ -19471,8 +19480,11 @@ export function init(RuntimeName, PHPLoader) {
19471
19480
  var trace = getCallstack();
19472
19481
  var parts = trace.split('\n');
19473
19482
  for (var i = 0; i < parts.length; i++) {
19474
- var ret = ((a1, a2) => {})(
19475
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
19483
+ var ret = ((
19484
+ a1,
19485
+ a2
19486
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
19487
+ 0,
19476
19488
  arg
19477
19489
  );
19478
19490
  if (ret !== 0) return;
@@ -20048,8 +20060,12 @@ export function init(RuntimeName, PHPLoader) {
20048
20060
  stringToUTF8(e.locale || '', keyEventData + 128, 32);
20049
20061
 
20050
20062
  if (
20051
- ((a1, a2, a3) => {})(
20052
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20063
+ ((
20064
+ a1,
20065
+ a2,
20066
+ a3
20067
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20068
+ eventTypeId,
20053
20069
  keyEventData,
20054
20070
  userData
20055
20071
  )
@@ -20167,8 +20183,12 @@ export function init(RuntimeName, PHPLoader) {
20167
20183
  fillMouseEventData(JSEvents.mouseEvent, e, target);
20168
20184
 
20169
20185
  if (
20170
- ((a1, a2, a3) => {})(
20171
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20186
+ ((
20187
+ a1,
20188
+ a2,
20189
+ a3
20190
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20191
+ eventTypeId,
20172
20192
  JSEvents.mouseEvent,
20173
20193
  userData
20174
20194
  )
@@ -20382,8 +20402,12 @@ export function init(RuntimeName, PHPLoader) {
20382
20402
  HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
20383
20403
  HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
20384
20404
  if (
20385
- ((a1, a2, a3) => {})(
20386
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20405
+ ((
20406
+ a1,
20407
+ a2,
20408
+ a3
20409
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20410
+ eventTypeId,
20387
20411
  wheelEvent,
20388
20412
  userData
20389
20413
  )
@@ -20464,8 +20488,12 @@ export function init(RuntimeName, PHPLoader) {
20464
20488
  HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
20465
20489
  HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
20466
20490
  if (
20467
- ((a1, a2, a3) => {})(
20468
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20491
+ ((
20492
+ a1,
20493
+ a2,
20494
+ a3
20495
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20496
+ eventTypeId,
20469
20497
  uiEvent,
20470
20498
  userData
20471
20499
  )
@@ -20539,8 +20567,12 @@ export function init(RuntimeName, PHPLoader) {
20539
20567
  stringToUTF8(id, focusEvent + 128, 128);
20540
20568
 
20541
20569
  if (
20542
- ((a1, a2, a3) => {})(
20543
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20570
+ ((
20571
+ a1,
20572
+ a2,
20573
+ a3
20574
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20575
+ eventTypeId,
20544
20576
  focusEvent,
20545
20577
  userData
20546
20578
  )
@@ -20656,8 +20688,12 @@ export function init(RuntimeName, PHPLoader) {
20656
20688
  ); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
20657
20689
 
20658
20690
  if (
20659
- ((a1, a2, a3) => {})(
20660
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20691
+ ((
20692
+ a1,
20693
+ a2,
20694
+ a3
20695
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20696
+ eventTypeId,
20661
20697
  JSEvents.deviceOrientationEvent,
20662
20698
  userData
20663
20699
  )
@@ -20740,8 +20776,12 @@ export function init(RuntimeName, PHPLoader) {
20740
20776
  fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
20741
20777
 
20742
20778
  if (
20743
- ((a1, a2, a3) => {})(
20744
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20779
+ ((
20780
+ a1,
20781
+ a2,
20782
+ a3
20783
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20784
+ eventTypeId,
20745
20785
  JSEvents.deviceMotionEvent,
20746
20786
  userData
20747
20787
  )
@@ -20851,8 +20891,12 @@ export function init(RuntimeName, PHPLoader) {
20851
20891
  fillOrientationChangeEventData(orientationChangeEvent);
20852
20892
 
20853
20893
  if (
20854
- ((a1, a2, a3) => {})(
20855
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
20894
+ ((
20895
+ a1,
20896
+ a2,
20897
+ a3
20898
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
20899
+ eventTypeId,
20856
20900
  orientationChangeEvent,
20857
20901
  userData
20858
20902
  )
@@ -20985,8 +21029,12 @@ export function init(RuntimeName, PHPLoader) {
20985
21029
  fillFullscreenChangeEventData(fullscreenChangeEvent);
20986
21030
 
20987
21031
  if (
20988
- ((a1, a2, a3) => {})(
20989
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21032
+ ((
21033
+ a1,
21034
+ a2,
21035
+ a3
21036
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21037
+ eventTypeId,
20990
21038
  fullscreenChangeEvent,
20991
21039
  userData
20992
21040
  )
@@ -21150,8 +21198,12 @@ export function init(RuntimeName, PHPLoader) {
21150
21198
  );
21151
21199
 
21152
21200
  if (currentFullscreenStrategy.canvasResizedCallback) {
21153
- ((a1, a2, a3) => {})(
21154
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21201
+ ((
21202
+ a1,
21203
+ a2,
21204
+ a3
21205
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21206
+ 37,
21155
21207
  0,
21156
21208
  currentFullscreenStrategy.canvasResizedCallbackUserData
21157
21209
  );
@@ -21257,8 +21309,12 @@ export function init(RuntimeName, PHPLoader) {
21257
21309
  currentFullscreenStrategy = strategy;
21258
21310
 
21259
21311
  if (strategy.canvasResizedCallback) {
21260
- ((a1, a2, a3) => {})(
21261
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21312
+ ((
21313
+ a1,
21314
+ a2,
21315
+ a3
21316
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21317
+ 37,
21262
21318
  0,
21263
21319
  strategy.canvasResizedCallbackUserData
21264
21320
  );
@@ -21360,8 +21416,12 @@ export function init(RuntimeName, PHPLoader) {
21360
21416
  !inCenteredWithoutScalingFullscreenMode &&
21361
21417
  currentFullscreenStrategy.canvasResizedCallback
21362
21418
  ) {
21363
- ((a1, a2, a3) => {})(
21364
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21419
+ ((
21420
+ a1,
21421
+ a2,
21422
+ a3
21423
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21424
+ 37,
21365
21425
  0,
21366
21426
  currentFullscreenStrategy.canvasResizedCallbackUserData
21367
21427
  );
@@ -21460,8 +21520,12 @@ export function init(RuntimeName, PHPLoader) {
21460
21520
  softFullscreenResizeWebGLRenderTarget
21461
21521
  );
21462
21522
  if (strategy.canvasResizedCallback) {
21463
- ((a1, a2, a3) => {})(
21464
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21523
+ ((
21524
+ a1,
21525
+ a2,
21526
+ a3
21527
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21528
+ 37,
21465
21529
  0,
21466
21530
  strategy.canvasResizedCallbackUserData
21467
21531
  );
@@ -21474,8 +21538,12 @@ export function init(RuntimeName, PHPLoader) {
21474
21538
 
21475
21539
  // Inform the caller that the canvas size has changed.
21476
21540
  if (strategy.canvasResizedCallback) {
21477
- ((a1, a2, a3) => {})(
21478
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
21541
+ ((
21542
+ a1,
21543
+ a2,
21544
+ a3
21545
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21546
+ 37,
21479
21547
  0,
21480
21548
  strategy.canvasResizedCallbackUserData
21481
21549
  );
@@ -21543,8 +21611,12 @@ export function init(RuntimeName, PHPLoader) {
21543
21611
  fillPointerlockChangeEventData(pointerlockChangeEvent);
21544
21612
 
21545
21613
  if (
21546
- ((a1, a2, a3) => {})(
21547
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21614
+ ((
21615
+ a1,
21616
+ a2,
21617
+ a3
21618
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21619
+ eventTypeId,
21548
21620
  pointerlockChangeEvent,
21549
21621
  userData
21550
21622
  )
@@ -21634,8 +21706,12 @@ export function init(RuntimeName, PHPLoader) {
21634
21706
  ) => {
21635
21707
  var pointerlockErrorEventHandlerFunc = (e = event) => {
21636
21708
  if (
21637
- ((a1, a2, a3) => {})(
21638
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21709
+ ((
21710
+ a1,
21711
+ a2,
21712
+ a3
21713
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21714
+ eventTypeId,
21639
21715
  0,
21640
21716
  userData
21641
21717
  )
@@ -21835,8 +21911,12 @@ export function init(RuntimeName, PHPLoader) {
21835
21911
  fillVisibilityChangeEventData(visibilityChangeEvent);
21836
21912
 
21837
21913
  if (
21838
- ((a1, a2, a3) => {})(
21839
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
21914
+ ((
21915
+ a1,
21916
+ a2,
21917
+ a3
21918
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
21919
+ eventTypeId,
21840
21920
  visibilityChangeEvent,
21841
21921
  userData
21842
21922
  )
@@ -21956,8 +22036,12 @@ export function init(RuntimeName, PHPLoader) {
21956
22036
  HEAP32[(touchEvent + 8) >> 2] = numTouches;
21957
22037
 
21958
22038
  if (
21959
- ((a1, a2, a3) => {})(
21960
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22039
+ ((
22040
+ a1,
22041
+ a2,
22042
+ a3
22043
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22044
+ eventTypeId,
21961
22045
  touchEvent,
21962
22046
  userData
21963
22047
  )
@@ -22095,8 +22179,12 @@ export function init(RuntimeName, PHPLoader) {
22095
22179
  fillGamepadEventData(gamepadEvent, e['gamepad']);
22096
22180
 
22097
22181
  if (
22098
- ((a1, a2, a3) => {})(
22099
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22182
+ ((
22183
+ a1,
22184
+ a2,
22185
+ a3
22186
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22187
+ eventTypeId,
22100
22188
  gamepadEvent,
22101
22189
  userData
22102
22190
  )
@@ -22198,8 +22286,12 @@ export function init(RuntimeName, PHPLoader) {
22198
22286
  ) => {
22199
22287
  var beforeUnloadEventHandlerFunc = (e = event) => {
22200
22288
  // Note: This is always called on the main browser thread, since it needs synchronously return a value!
22201
- var confirmationMessage = ((a1, a2, a3) => {})(
22202
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22289
+ var confirmationMessage = ((
22290
+ a1,
22291
+ a2,
22292
+ a3
22293
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22294
+ eventTypeId,
22203
22295
  0,
22204
22296
  userData
22205
22297
  );
@@ -22270,8 +22362,12 @@ export function init(RuntimeName, PHPLoader) {
22270
22362
  fillBatteryEventData(batteryEvent, battery());
22271
22363
 
22272
22364
  if (
22273
- ((a1, a2, a3) => {})(
22274
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
22365
+ ((
22366
+ a1,
22367
+ a2,
22368
+ a3
22369
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22370
+ eventTypeId,
22275
22371
  batteryEvent,
22276
22372
  userData
22277
22373
  )
@@ -22361,8 +22457,11 @@ export function init(RuntimeName, PHPLoader) {
22361
22457
 
22362
22458
  var _emscripten_request_animation_frame = (cb, userData) =>
22363
22459
  requestAnimationFrame((timeStamp) =>
22364
- ((a1, a2) => {})(
22365
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22460
+ ((
22461
+ a1,
22462
+ a2
22463
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22464
+ timeStamp,
22366
22465
  userData
22367
22466
  )
22368
22467
  );
@@ -22374,8 +22473,11 @@ export function init(RuntimeName, PHPLoader) {
22374
22473
  var _emscripten_request_animation_frame_loop = (cb, userData) => {
22375
22474
  function tick(timeStamp) {
22376
22475
  if (
22377
- ((a1, a2) => {})(
22378
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
22476
+ ((
22477
+ a1,
22478
+ a2
22479
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22480
+ timeStamp,
22379
22481
  userData
22380
22482
  )
22381
22483
  ) {
@@ -22600,8 +22702,10 @@ export function init(RuntimeName, PHPLoader) {
22600
22702
  return emSetImmediate(() => {
22601
22703
  runtimeKeepalivePop();
22602
22704
  callUserCallback(() =>
22603
- ((a1) => {})(
22604
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22705
+ ((
22706
+ a1
22707
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22708
+ userData
22605
22709
  )
22606
22710
  );
22607
22711
  });
@@ -22618,8 +22722,10 @@ export function init(RuntimeName, PHPLoader) {
22618
22722
  function tick() {
22619
22723
  callUserCallback(() => {
22620
22724
  if (
22621
- ((a1) => {})(
22622
- /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22725
+ ((
22726
+ a1
22727
+ ) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22728
+ userData
22623
22729
  )
22624
22730
  ) {
22625
22731
  emSetImmediate(tick);
@@ -22636,8 +22742,10 @@ export function init(RuntimeName, PHPLoader) {
22636
22742
  var _emscripten_set_timeout = (cb, msecs, userData) =>
22637
22743
  safeSetTimeout(
22638
22744
  () =>
22639
- ((a1) => {})(
22640
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22745
+ ((
22746
+ a1
22747
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22748
+ userData
22641
22749
  ),
22642
22750
  msecs
22643
22751
  );
@@ -22653,8 +22761,11 @@ export function init(RuntimeName, PHPLoader) {
22653
22761
  runtimeKeepalivePop();
22654
22762
  callUserCallback(() => {
22655
22763
  if (
22656
- ((a1, a2) => {})(
22657
- /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
22764
+ ((
22765
+ a1,
22766
+ a2
22767
+ ) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22768
+ t,
22658
22769
  userData
22659
22770
  )
22660
22771
  ) {
@@ -22678,8 +22789,10 @@ export function init(RuntimeName, PHPLoader) {
22678
22789
  runtimeKeepalivePush();
22679
22790
  return setInterval(() => {
22680
22791
  callUserCallback(() =>
22681
- ((a1) => {})(
22682
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
22792
+ ((
22793
+ a1
22794
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22795
+ userData
22683
22796
  )
22684
22797
  );
22685
22798
  }, msecs);
@@ -22694,8 +22807,10 @@ export function init(RuntimeName, PHPLoader) {
22694
22807
 
22695
22808
  var _emscripten_async_call = (func, arg, millis) => {
22696
22809
  var wrapper = () =>
22697
- ((a1) => {})(
22698
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22810
+ ((
22811
+ a1
22812
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22813
+ arg
22699
22814
  );
22700
22815
 
22701
22816
  if (
@@ -22728,7 +22843,7 @@ export function init(RuntimeName, PHPLoader) {
22728
22843
 
22729
22844
  var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
22730
22845
  var iterFunc =
22731
- () => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
22846
+ () => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
22732
22847
  setMainLoop(iterFunc, fps, simulateInfiniteLoop);
22733
22848
  };
22734
22849
  _emscripten_set_main_loop.sig = 'vpii';
@@ -22740,8 +22855,10 @@ export function init(RuntimeName, PHPLoader) {
22740
22855
  simulateInfiniteLoop
22741
22856
  ) => {
22742
22857
  var iterFunc = () =>
22743
- ((a1) => {})(
22744
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22858
+ ((
22859
+ a1
22860
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22861
+ arg
22745
22862
  );
22746
22863
  setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
22747
22864
  };
@@ -22762,8 +22879,10 @@ export function init(RuntimeName, PHPLoader) {
22762
22879
  var __emscripten_push_main_loop_blocker = (func, arg, name) => {
22763
22880
  MainLoop.queue.push({
22764
22881
  func: () => {
22765
- ((a1) => {})(
22766
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22882
+ ((
22883
+ a1
22884
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22885
+ arg
22767
22886
  );
22768
22887
  },
22769
22888
  name: UTF8ToString(name),
@@ -22776,8 +22895,10 @@ export function init(RuntimeName, PHPLoader) {
22776
22895
  var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
22777
22896
  MainLoop.queue.push({
22778
22897
  func: () => {
22779
- ((a1) => {})(
22780
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
22898
+ ((
22899
+ a1
22900
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22901
+ arg
22781
22902
  );
22782
22903
  },
22783
22904
  name: UTF8ToString(name),
@@ -22811,8 +22932,12 @@ export function init(RuntimeName, PHPLoader) {
22811
22932
  var resultPtr = stackAlloc(POINTER_SIZE);
22812
22933
  HEAPU32[resultPtr >> 2] = 0;
22813
22934
  try {
22814
- var result = ((a1, a2, a3) => {})(
22815
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
22935
+ var result = ((
22936
+ a1,
22937
+ a2,
22938
+ a3
22939
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
22940
+ resultPtr,
22816
22941
  userData,
22817
22942
  value
22818
22943
  );
@@ -23748,15 +23873,19 @@ export function init(RuntimeName, PHPLoader) {
23748
23873
  () => {
23749
23874
  runtimeKeepalivePop();
23750
23875
  if (onload)
23751
- ((a1) => {})(
23752
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23876
+ ((
23877
+ a1
23878
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23879
+ file
23753
23880
  );
23754
23881
  },
23755
23882
  () => {
23756
23883
  runtimeKeepalivePop();
23757
23884
  if (onerror)
23758
- ((a1) => {})(
23759
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
23885
+ ((
23886
+ a1
23887
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23888
+ file
23760
23889
  );
23761
23890
  },
23762
23891
  true // don'tCreateFile - it's already there
@@ -23790,16 +23919,21 @@ export function init(RuntimeName, PHPLoader) {
23790
23919
  () => {
23791
23920
  runtimeKeepalivePop();
23792
23921
  if (onload)
23793
- ((a1, a2) => {})(
23794
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
23922
+ ((
23923
+ a1,
23924
+ a2
23925
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23926
+ arg,
23795
23927
  cname
23796
23928
  );
23797
23929
  },
23798
23930
  () => {
23799
23931
  runtimeKeepalivePop();
23800
23932
  if (onerror)
23801
- ((a1) => {})(
23802
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
23933
+ ((
23934
+ a1
23935
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
23936
+ arg
23803
23937
  );
23804
23938
  },
23805
23939
  true // don'tCreateFile - it's already there
@@ -24072,10 +24206,10 @@ export function init(RuntimeName, PHPLoader) {
24072
24206
  runtimeKeepalivePop();
24073
24207
  callUserCallback(() => {
24074
24208
  var sp = stackSave();
24075
- ((a1) => {})(
24076
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
24077
- _file
24078
- )
24209
+ ((
24210
+ a1
24211
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24212
+ stringToUTF8OnStack(_file)
24079
24213
  );
24080
24214
  stackRestore(sp);
24081
24215
  });
@@ -24119,8 +24253,12 @@ export function init(RuntimeName, PHPLoader) {
24119
24253
  callUserCallback(() => {
24120
24254
  var buffer = _malloc(byteArray.length);
24121
24255
  HEAPU8.set(byteArray, buffer);
24122
- ((a1, a2, a3) => {})(
24123
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
24256
+ ((
24257
+ a1,
24258
+ a2,
24259
+ a3
24260
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24261
+ userdata,
24124
24262
  buffer,
24125
24263
  byteArray.length
24126
24264
  );
@@ -24130,8 +24268,10 @@ export function init(RuntimeName, PHPLoader) {
24130
24268
  if (onerror) {
24131
24269
  runtimeKeepalivePop();
24132
24270
  callUserCallback(() => {
24133
- ((a1) => {})(
24134
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
24271
+ ((
24272
+ a1
24273
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24274
+ userdata
24135
24275
  );
24136
24276
  });
24137
24277
  }
@@ -24188,8 +24328,12 @@ export function init(RuntimeName, PHPLoader) {
24188
24328
  );
24189
24329
  if (onload) {
24190
24330
  var sp = stackSave();
24191
- ((a1, a2, a3) => {})(
24192
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24331
+ ((
24332
+ a1,
24333
+ a2,
24334
+ a3
24335
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24336
+ handle,
24193
24337
  userdata,
24194
24338
  stringToUTF8OnStack(_file)
24195
24339
  );
@@ -24197,8 +24341,12 @@ export function init(RuntimeName, PHPLoader) {
24197
24341
  }
24198
24342
  } else {
24199
24343
  if (onerror)
24200
- ((a1, a2, a3) => {})(
24201
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24344
+ ((
24345
+ a1,
24346
+ a2,
24347
+ a3
24348
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24349
+ handle,
24202
24350
  userdata,
24203
24351
  http.status
24204
24352
  );
@@ -24211,8 +24359,12 @@ export function init(RuntimeName, PHPLoader) {
24211
24359
  http.onerror = (e) => {
24212
24360
  runtimeKeepalivePop();
24213
24361
  if (onerror)
24214
- ((a1, a2, a3) => {})(
24215
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24362
+ ((
24363
+ a1,
24364
+ a2,
24365
+ a3
24366
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24367
+ handle,
24216
24368
  userdata,
24217
24369
  http.status
24218
24370
  );
@@ -24227,8 +24379,12 @@ export function init(RuntimeName, PHPLoader) {
24227
24379
  ) {
24228
24380
  var percentComplete = (e.loaded / e.total) * 100;
24229
24381
  if (onprogress)
24230
- ((a1, a2, a3) => {})(
24231
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24382
+ ((
24383
+ a1,
24384
+ a2,
24385
+ a3
24386
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24387
+ handle,
24232
24388
  userdata,
24233
24389
  percentComplete
24234
24390
  );
@@ -24285,8 +24441,13 @@ export function init(RuntimeName, PHPLoader) {
24285
24441
  if (http.statusText) {
24286
24442
  statusText = stringToUTF8OnStack(http.statusText);
24287
24443
  }
24288
- ((a1, a2, a3, a4) => {})(
24289
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24444
+ ((
24445
+ a1,
24446
+ a2,
24447
+ a3,
24448
+ a4
24449
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24450
+ handle,
24290
24451
  userdata,
24291
24452
  http.status,
24292
24453
  statusText
@@ -24307,8 +24468,13 @@ export function init(RuntimeName, PHPLoader) {
24307
24468
  var buffer = _malloc(byteArray.length);
24308
24469
  HEAPU8.set(byteArray, buffer);
24309
24470
  if (onload)
24310
- ((a1, a2, a3, a4) => {})(
24311
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24471
+ ((
24472
+ a1,
24473
+ a2,
24474
+ a3,
24475
+ a4
24476
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24477
+ handle,
24312
24478
  userdata,
24313
24479
  buffer,
24314
24480
  byteArray.length
@@ -24329,8 +24495,13 @@ export function init(RuntimeName, PHPLoader) {
24329
24495
  // PROGRESS
24330
24496
  http.onprogress = (e) => {
24331
24497
  if (onprogress)
24332
- ((a1, a2, a3, a4) => {})(
24333
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
24498
+ ((
24499
+ a1,
24500
+ a2,
24501
+ a3,
24502
+ a4
24503
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24504
+ handle,
24334
24505
  userdata,
24335
24506
  e.loaded,
24336
24507
  e.lengthComputable || e.lengthComputable === undefined
@@ -24450,16 +24621,24 @@ export function init(RuntimeName, PHPLoader) {
24450
24621
  if (event === 'error') {
24451
24622
  withStackSave(() => {
24452
24623
  var msg = stringToUTF8OnStack(data[2]);
24453
- ((a1, a2, a3, a4) => {})(
24454
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
24624
+ ((
24625
+ a1,
24626
+ a2,
24627
+ a3,
24628
+ a4
24629
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24630
+ data[0],
24455
24631
  data[1],
24456
24632
  msg,
24457
24633
  userData
24458
24634
  );
24459
24635
  });
24460
24636
  } else {
24461
- ((a1, a2) => {})(
24462
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
24637
+ ((
24638
+ a1,
24639
+ a2
24640
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
24641
+ data,
24463
24642
  userData
24464
24643
  );
24465
24644
  }
@@ -24925,8 +25104,12 @@ export function init(RuntimeName, PHPLoader) {
24925
25104
  ) => {
24926
25105
  var webGlEventHandlerFunc = (e = event) => {
24927
25106
  if (
24928
- ((a1, a2, a3) => {})(
24929
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
25107
+ ((
25108
+ a1,
25109
+ a2,
25110
+ a3
25111
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25112
+ eventTypeId,
24930
25113
  0,
24931
25114
  userData
24932
25115
  )
@@ -25145,15 +25328,21 @@ export function init(RuntimeName, PHPLoader) {
25145
25328
  ) {
25146
25329
  event.preventDefault();
25147
25330
  GLUT.saveModifiers(event);
25148
- ((a1, a2) => {})(
25149
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25331
+ ((
25332
+ a1,
25333
+ a2
25334
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25335
+ lastX,
25150
25336
  lastY
25151
25337
  );
25152
25338
  } else if (GLUT.buttons != 0 && GLUT.motionFunc) {
25153
25339
  event.preventDefault();
25154
25340
  GLUT.saveModifiers(event);
25155
- ((a1, a2) => {})(
25156
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
25341
+ ((
25342
+ a1,
25343
+ a2
25344
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25345
+ lastX,
25157
25346
  lastY
25158
25347
  );
25159
25348
  }
@@ -25314,8 +25503,12 @@ export function init(RuntimeName, PHPLoader) {
25314
25503
  if (GLUT.specialFunc) {
25315
25504
  event.preventDefault();
25316
25505
  GLUT.saveModifiers(event);
25317
- ((a1, a2, a3) => {})(
25318
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25506
+ ((
25507
+ a1,
25508
+ a2,
25509
+ a3
25510
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25511
+ key,
25319
25512
  Browser.mouseX,
25320
25513
  Browser.mouseY
25321
25514
  );
@@ -25325,8 +25518,12 @@ export function init(RuntimeName, PHPLoader) {
25325
25518
  if (key !== null && GLUT.keyboardFunc) {
25326
25519
  event.preventDefault();
25327
25520
  GLUT.saveModifiers(event);
25328
- ((a1, a2, a3) => {})(
25329
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25521
+ ((
25522
+ a1,
25523
+ a2,
25524
+ a3
25525
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25526
+ key,
25330
25527
  Browser.mouseX,
25331
25528
  Browser.mouseY
25332
25529
  );
@@ -25341,8 +25538,12 @@ export function init(RuntimeName, PHPLoader) {
25341
25538
  if (GLUT.specialUpFunc) {
25342
25539
  event.preventDefault();
25343
25540
  GLUT.saveModifiers(event);
25344
- ((a1, a2, a3) => {})(
25345
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25541
+ ((
25542
+ a1,
25543
+ a2,
25544
+ a3
25545
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25546
+ key,
25346
25547
  Browser.mouseX,
25347
25548
  Browser.mouseY
25348
25549
  );
@@ -25352,8 +25553,12 @@ export function init(RuntimeName, PHPLoader) {
25352
25553
  if (key !== null && GLUT.keyboardUpFunc) {
25353
25554
  event.preventDefault();
25354
25555
  GLUT.saveModifiers(event);
25355
- ((a1, a2, a3) => {})(
25356
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
25556
+ ((
25557
+ a1,
25558
+ a2,
25559
+ a3
25560
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25561
+ key,
25357
25562
  Browser.mouseX,
25358
25563
  Browser.mouseY
25359
25564
  );
@@ -25417,10 +25622,13 @@ export function init(RuntimeName, PHPLoader) {
25417
25622
  } catch (e) {}
25418
25623
  event.preventDefault();
25419
25624
  GLUT.saveModifiers(event);
25420
- ((a1, a2, a3, a4) => {})(
25421
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25422
- 'button'
25423
- ],
25625
+ ((
25626
+ a1,
25627
+ a2,
25628
+ a3,
25629
+ a4
25630
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25631
+ event['button'],
25424
25632
  0 /*GLUT_DOWN*/,
25425
25633
  Browser.mouseX,
25426
25634
  Browser.mouseY
@@ -25435,10 +25643,13 @@ export function init(RuntimeName, PHPLoader) {
25435
25643
  if (GLUT.mouseFunc) {
25436
25644
  event.preventDefault();
25437
25645
  GLUT.saveModifiers(event);
25438
- ((a1, a2, a3, a4) => {})(
25439
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
25440
- 'button'
25441
- ],
25646
+ ((
25647
+ a1,
25648
+ a2,
25649
+ a3,
25650
+ a4
25651
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25652
+ event['button'],
25442
25653
  1 /*GLUT_UP*/,
25443
25654
  Browser.mouseX,
25444
25655
  Browser.mouseY
@@ -25467,8 +25678,13 @@ export function init(RuntimeName, PHPLoader) {
25467
25678
  if (GLUT.mouseFunc) {
25468
25679
  event.preventDefault();
25469
25680
  GLUT.saveModifiers(event);
25470
- ((a1, a2, a3, a4) => {})(
25471
- /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
25681
+ ((
25682
+ a1,
25683
+ a2,
25684
+ a3,
25685
+ a4
25686
+ ) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25687
+ button,
25472
25688
  0 /*GLUT_DOWN*/,
25473
25689
  Browser.mouseX,
25474
25690
  Browser.mouseY
@@ -25511,8 +25727,11 @@ export function init(RuntimeName, PHPLoader) {
25511
25727
  /* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
25512
25728
  if (GLUT.reshapeFunc) {
25513
25729
  // out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
25514
- ((a1, a2) => {})(
25515
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25730
+ ((
25731
+ a1,
25732
+ a2
25733
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25734
+ width,
25516
25735
  height
25517
25736
  );
25518
25737
  }
@@ -25555,8 +25774,11 @@ export function init(RuntimeName, PHPLoader) {
25555
25774
 
25556
25775
  Browser.resizeListeners.push((width, height) => {
25557
25776
  if (GLUT.reshapeFunc) {
25558
- ((a1, a2) => {})(
25559
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
25777
+ ((
25778
+ a1,
25779
+ a2
25780
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25781
+ width,
25560
25782
  height
25561
25783
  );
25562
25784
  }
@@ -25669,8 +25891,10 @@ export function init(RuntimeName, PHPLoader) {
25669
25891
  var _glutTimerFunc = (msec, func, value) =>
25670
25892
  safeSetTimeout(
25671
25893
  () =>
25672
- ((a1) => {})(
25673
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
25894
+ ((
25895
+ a1
25896
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
25897
+ value
25674
25898
  ),
25675
25899
  msec
25676
25900
  );
@@ -25830,8 +26054,11 @@ export function init(RuntimeName, PHPLoader) {
25830
26054
  Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
25831
26055
  // Just call it once here.
25832
26056
  if (GLUT.reshapeFunc) {
25833
- ((a1, a2) => {})(
25834
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
26057
+ ((
26058
+ a1,
26059
+ a2
26060
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
26061
+ width,
25835
26062
  height
25836
26063
  );
25837
26064
  }
@@ -26893,15 +27120,21 @@ export function init(RuntimeName, PHPLoader) {
26893
27120
  callUserCallback(() => {
26894
27121
  if (error) {
26895
27122
  if (onerror)
26896
- ((a1) => {})(
26897
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27123
+ ((
27124
+ a1
27125
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27126
+ arg
26898
27127
  );
26899
27128
  return;
26900
27129
  }
26901
27130
  var buffer = _malloc(byteArray.length);
26902
27131
  HEAPU8.set(byteArray, buffer);
26903
- ((a1, a2, a3) => {})(
26904
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27132
+ ((
27133
+ a1,
27134
+ a2,
27135
+ a3
27136
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27137
+ arg,
26905
27138
  buffer,
26906
27139
  byteArray.length
26907
27140
  );
@@ -26933,14 +27166,18 @@ export function init(RuntimeName, PHPLoader) {
26933
27166
  callUserCallback(() => {
26934
27167
  if (error) {
26935
27168
  if (onerror)
26936
- ((a1) => {})(
26937
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27169
+ ((
27170
+ a1
27171
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27172
+ arg
26938
27173
  );
26939
27174
  return;
26940
27175
  }
26941
27176
  if (onstore)
26942
- ((a1) => {})(
26943
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27177
+ ((
27178
+ a1
27179
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27180
+ arg
26944
27181
  );
26945
27182
  });
26946
27183
  }
@@ -26955,14 +27192,18 @@ export function init(RuntimeName, PHPLoader) {
26955
27192
  callUserCallback(() => {
26956
27193
  if (error) {
26957
27194
  if (onerror)
26958
- ((a1) => {})(
26959
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27195
+ ((
27196
+ a1
27197
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27198
+ arg
26960
27199
  );
26961
27200
  return;
26962
27201
  }
26963
27202
  if (ondelete)
26964
- ((a1) => {})(
26965
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27203
+ ((
27204
+ a1
27205
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27206
+ arg
26966
27207
  );
26967
27208
  });
26968
27209
  });
@@ -26979,14 +27220,19 @@ export function init(RuntimeName, PHPLoader) {
26979
27220
  callUserCallback(() => {
26980
27221
  if (error) {
26981
27222
  if (onerror)
26982
- ((a1) => {})(
26983
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27223
+ ((
27224
+ a1
27225
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27226
+ arg
26984
27227
  );
26985
27228
  return;
26986
27229
  }
26987
27230
  if (oncheck)
26988
- ((a1, a2) => {})(
26989
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
27231
+ ((
27232
+ a1,
27233
+ a2
27234
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27235
+ arg,
26990
27236
  exists
26991
27237
  );
26992
27238
  });
@@ -27002,14 +27248,18 @@ export function init(RuntimeName, PHPLoader) {
27002
27248
  callUserCallback(() => {
27003
27249
  if (error) {
27004
27250
  if (onerror)
27005
- ((a1) => {})(
27006
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27251
+ ((
27252
+ a1
27253
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27254
+ arg
27007
27255
  );
27008
27256
  return;
27009
27257
  }
27010
27258
  if (onclear)
27011
- ((a1) => {})(
27012
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
27259
+ ((
27260
+ a1
27261
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27262
+ arg
27013
27263
  );
27014
27264
  });
27015
27265
  });
@@ -27166,8 +27416,11 @@ export function init(RuntimeName, PHPLoader) {
27166
27416
  safeSetTimeout(() => {
27167
27417
  var stackBegin = Asyncify.currData + 12;
27168
27418
  var stackEnd = HEAPU32[Asyncify.currData >> 2];
27169
- ((a1, a2) => {})(
27170
- /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
27419
+ ((
27420
+ a1,
27421
+ a2
27422
+ ) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27423
+ stackBegin,
27171
27424
  stackEnd
27172
27425
  );
27173
27426
  wakeUp();
@@ -27228,8 +27481,10 @@ export function init(RuntimeName, PHPLoader) {
27228
27481
  HEAPU32[(newFiber + 12) >> 2] = 0;
27229
27482
 
27230
27483
  var userData = HEAPU32[(newFiber + 16) >> 2];
27231
- ((a1) => {})(
27232
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
27484
+ ((
27485
+ a1
27486
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
27487
+ userData
27233
27488
  );
27234
27489
  } else {
27235
27490
  var asyncifyData = newFiber + 20;
@@ -28241,8 +28496,11 @@ export function init(RuntimeName, PHPLoader) {
28241
28496
  if (!SDL.eventHandler) return;
28242
28497
 
28243
28498
  while (SDL.pollEvent(SDL.eventHandlerTemp)) {
28244
- ((a1, a2) => {})(
28245
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
28499
+ ((
28500
+ a1,
28501
+ a2
28502
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
28503
+ SDL.eventHandlerContext,
28246
28504
  SDL.eventHandlerTemp
28247
28505
  );
28248
28506
  }
@@ -29875,9 +30133,12 @@ export function init(RuntimeName, PHPLoader) {
29875
30133
  return;
29876
30134
 
29877
30135
  // Ask SDL audio data from the user code.
29878
- ((a1, a2, a3) => {})(
29879
- /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
29880
- .audio.userdata,
30136
+ ((
30137
+ a1,
30138
+ a2,
30139
+ a3
30140
+ ) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30141
+ SDL.audio.userdata,
29881
30142
  SDL.audio.buffer,
29882
30143
  SDL.audio.bufferSize
29883
30144
  );
@@ -30335,8 +30596,10 @@ export function init(RuntimeName, PHPLoader) {
30335
30596
  info.audio = null;
30336
30597
  }
30337
30598
  if (SDL.channelFinished) {
30338
- ((a1) => {})(
30339
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30599
+ ((
30600
+ a1
30601
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30602
+ channel
30340
30603
  );
30341
30604
  }
30342
30605
  }
@@ -30405,8 +30668,10 @@ export function init(RuntimeName, PHPLoader) {
30405
30668
  channelInfo.audio = null;
30406
30669
  }
30407
30670
  if (SDL.channelFinished)
30408
- ((a1) => {})(
30409
- /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
30671
+ ((
30672
+ a1
30673
+ ) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
30674
+ channel
30410
30675
  );
30411
30676
  };
30412
30677
  if (channelInfo.audio) {
@@ -31154,8 +31419,11 @@ export function init(RuntimeName, PHPLoader) {
31154
31419
  var _SDL_AddTimer = (interval, callback, param) =>
31155
31420
  safeSetTimeout(
31156
31421
  () =>
31157
- ((a1, a2) => {})(
31158
- /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
31422
+ ((
31423
+ a1,
31424
+ a2
31425
+ ) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31426
+ interval,
31159
31427
  param
31160
31428
  ),
31161
31429
  interval
@@ -31526,8 +31794,12 @@ export function init(RuntimeName, PHPLoader) {
31526
31794
 
31527
31795
  socket.onopen = function (e) {
31528
31796
  var eventPtr = WS.getSocketEvent(socketId);
31529
- ((a1, a2, a3) => {})(
31530
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31797
+ ((
31798
+ a1,
31799
+ a2,
31800
+ a3
31801
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31802
+ 0 /*TODO*/,
31531
31803
  eventPtr,
31532
31804
  userData
31533
31805
  );
@@ -31549,8 +31821,12 @@ export function init(RuntimeName, PHPLoader) {
31549
31821
 
31550
31822
  socket.onerror = function (e) {
31551
31823
  var eventPtr = WS.getSocketEvent(socketId);
31552
- ((a1, a2, a3) => {})(
31553
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31824
+ ((
31825
+ a1,
31826
+ a2,
31827
+ a3
31828
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31829
+ 0 /*TODO*/,
31554
31830
  eventPtr,
31555
31831
  userData
31556
31832
  );
@@ -31575,8 +31851,12 @@ export function init(RuntimeName, PHPLoader) {
31575
31851
  (HEAP8[eventPtr + 4] = e.wasClean),
31576
31852
  (HEAP16[(eventPtr + 6) >> 1] = e.code),
31577
31853
  stringToUTF8(e.reason, eventPtr + 8, 512);
31578
- ((a1, a2, a3) => {})(
31579
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31854
+ ((
31855
+ a1,
31856
+ a2,
31857
+ a3
31858
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31859
+ 0 /*TODO*/,
31580
31860
  eventPtr,
31581
31861
  userData
31582
31862
  );
@@ -31610,8 +31890,12 @@ export function init(RuntimeName, PHPLoader) {
31610
31890
  (HEAPU32[(eventPtr + 4) >> 2] = buf),
31611
31891
  (HEAP32[(eventPtr + 8) >> 2] = len),
31612
31892
  (HEAP8[eventPtr + 12] = isText),
31613
- ((a1, a2, a3) => {})(
31614
- /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
31893
+ ((
31894
+ a1,
31895
+ a2,
31896
+ a3
31897
+ ) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
31898
+ 0 /*TODO*/,
31615
31899
  eventPtr,
31616
31900
  userData
31617
31901
  );