@php-wasm/node 2.0.4 → 2.0.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/asyncify/7_2_34/php_7_2.wasm +0 -0
- package/asyncify/7_3_33/php_7_3.wasm +0 -0
- package/asyncify/7_4_33/php_7_4.wasm +0 -0
- package/asyncify/8_0_30/php_8_0.wasm +0 -0
- package/asyncify/8_1_33/php_8_1.wasm +0 -0
- package/asyncify/8_2_29/php_8_2.wasm +0 -0
- package/asyncify/8_3_23/php_8_3.wasm +0 -0
- package/asyncify/8_3_24/php_8_3.wasm +0 -0
- package/asyncify/8_4_10/php_8_4.wasm +0 -0
- package/asyncify/8_4_11/php_8_4.wasm +0 -0
- package/asyncify/php_7_2.js +512 -223
- package/asyncify/php_7_3.js +509 -220
- package/asyncify/php_7_4.js +516 -227
- package/asyncify/php_8_0.js +509 -220
- package/asyncify/php_8_1.js +509 -220
- package/asyncify/php_8_2.js +509 -220
- package/asyncify/php_8_3.js +519 -230
- package/asyncify/php_8_4.js +515 -226
- package/index.cjs +657 -1191
- package/index.js +657 -1191
- package/jspi/7_2_34/php_7_2.wasm +0 -0
- package/jspi/7_3_33/php_7_3.wasm +0 -0
- package/jspi/7_4_33/php_7_4.wasm +0 -0
- package/jspi/8_0_30/php_8_0.wasm +0 -0
- package/jspi/8_1_33/php_8_1.wasm +0 -0
- package/jspi/8_2_29/php_8_2.wasm +0 -0
- package/jspi/8_3_23/php_8_3.wasm +0 -0
- package/jspi/8_3_24/php_8_3.wasm +0 -0
- package/jspi/8_4_10/php_8_4.wasm +0 -0
- package/jspi/8_4_11/php_8_4.wasm +0 -0
- package/jspi/php_7_2.js +42 -36
- package/jspi/php_7_3.js +42 -36
- package/jspi/php_7_4.js +42 -36
- package/jspi/php_8_0.js +42 -36
- package/jspi/php_8_1.js +42 -36
- package/jspi/php_8_2.js +42 -36
- package/jspi/php_8_3.js +48 -42
- package/jspi/php_8_4.js +48 -42
- package/lib/file-lock-manager-for-node.d.ts +9 -2
- package/lib/load-runtime.d.ts +2 -1
- package/package.json +7 -7
package/asyncify/php_7_4.js
CHANGED
|
@@ -8,7 +8,7 @@ import path from 'path';
|
|
|
8
8
|
|
|
9
9
|
const dependencyFilename = path.join(__dirname, '7_4_33', 'php_7_4.wasm');
|
|
10
10
|
export { dependencyFilename };
|
|
11
|
-
export const dependenciesTotalSize =
|
|
11
|
+
export const dependenciesTotalSize = 30107713;
|
|
12
12
|
const phpVersionString = '7.4.33';
|
|
13
13
|
export function init(RuntimeName, PHPLoader) {
|
|
14
14
|
// The rest of the code comes from the built php.js file and esm-suffix.js
|
|
@@ -831,7 +831,7 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
831
831
|
},
|
|
832
832
|
};
|
|
833
833
|
|
|
834
|
-
var ___heap_base =
|
|
834
|
+
var ___heap_base = 13083840;
|
|
835
835
|
|
|
836
836
|
var alignMemory = (size, alignment) => {
|
|
837
837
|
return Math.ceil(size / alignment) * alignment;
|
|
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
1774
1774
|
);
|
|
1775
1775
|
|
|
1776
1776
|
var ___call_sighandler = (fp, sig) =>
|
|
1777
|
-
((
|
|
1778
|
-
|
|
1777
|
+
((
|
|
1778
|
+
a1
|
|
1779
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
1780
|
+
sig
|
|
1779
1781
|
);
|
|
1780
1782
|
___call_sighandler.sig = 'vpi';
|
|
1781
1783
|
|
|
@@ -1854,13 +1856,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
1854
1856
|
1024
|
|
1855
1857
|
);
|
|
1856
1858
|
|
|
1857
|
-
var ___stack_high =
|
|
1859
|
+
var ___stack_high = 13083840;
|
|
1858
1860
|
|
|
1859
|
-
var ___stack_low =
|
|
1861
|
+
var ___stack_low = 12035264;
|
|
1860
1862
|
|
|
1861
1863
|
var ___stack_pointer = new WebAssembly.Global(
|
|
1862
1864
|
{ value: 'i32', mutable: true },
|
|
1863
|
-
|
|
1865
|
+
13083840
|
|
1864
1866
|
);
|
|
1865
1867
|
|
|
1866
1868
|
var PATH = {
|
|
@@ -7101,35 +7103,25 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7101
7103
|
1: 'exclusive',
|
|
7102
7104
|
2: 'unlocked',
|
|
7103
7105
|
},
|
|
7104
|
-
|
|
7105
|
-
|
|
7106
|
-
|
|
7107
|
-
|
|
7108
|
-
|
|
7109
|
-
|
|
7110
|
-
|
|
7111
|
-
|
|
7112
|
-
|
|
7113
|
-
|
|
7114
|
-
|
|
7106
|
+
is_path_to_shared_fs(path) {
|
|
7107
|
+
_js_wasm_trace('is_path_to_shared_fs(%s)', path);
|
|
7108
|
+
const { node } = FS.lookupPath(path, { noent_okay: true });
|
|
7109
|
+
if (node.mount.type !== PROXYFS) {
|
|
7110
|
+
return !!node.isSharedFS;
|
|
7111
|
+
}
|
|
7112
|
+
|
|
7113
|
+
// This looks like a PROXYFS node. Let's try a lookup.
|
|
7114
|
+
const nodePath = PROXYFS.realPath(node);
|
|
7115
|
+
const backingFs = node?.mount?.opts?.fs;
|
|
7116
|
+
if (backingFs) {
|
|
7117
|
+
// Tolerate ENOENT because looking up a MEMFS node by path always fails.
|
|
7118
|
+
const { node: backingNode } = backingFs.lookupPath(nodePath, {
|
|
7119
|
+
noent_okay: true,
|
|
7120
|
+
});
|
|
7121
|
+
return !!backingNode?.isSharedFS;
|
|
7115
7122
|
}
|
|
7116
7123
|
|
|
7117
|
-
|
|
7118
|
-
if (node.mount.type !== NODEFS) {
|
|
7119
|
-
return false;
|
|
7120
|
-
}
|
|
7121
|
-
const vfsPath = node.mount.type.realPath(node);
|
|
7122
|
-
try {
|
|
7123
|
-
const underlyingNode =
|
|
7124
|
-
node.mount.opts.fs.lookupPath(vfsPath)?.node;
|
|
7125
|
-
return !!underlyingNode?.isSharedFS;
|
|
7126
|
-
} catch (e) {
|
|
7127
|
-
return false;
|
|
7128
|
-
}
|
|
7129
|
-
},
|
|
7130
|
-
is_path_to_shared_fs(path) {
|
|
7131
|
-
const { node } = FS.lookupPath(path);
|
|
7132
|
-
return locking.is_shared_fs_node(node);
|
|
7124
|
+
return false;
|
|
7133
7125
|
},
|
|
7134
7126
|
get_fd_access_mode(fd) {
|
|
7135
7127
|
const emscripten_F_GETFL = Number('3');
|
|
@@ -7147,8 +7139,26 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7147
7139
|
}
|
|
7148
7140
|
},
|
|
7149
7141
|
get_native_path_from_vfs_path(vfsPath) {
|
|
7150
|
-
|
|
7151
|
-
|
|
7142
|
+
// TODO: Should there be a try/catch here?
|
|
7143
|
+
const { node } = FS.lookupPath(vfsPath, {});
|
|
7144
|
+
if (node.mount.type === NODEFS) {
|
|
7145
|
+
return NODEFS.realPath(node);
|
|
7146
|
+
} else if (node.mount.type === PROXYFS) {
|
|
7147
|
+
// TODO: Tolerate ENOENT here?
|
|
7148
|
+
const { node: backingNode, path: backingPath } =
|
|
7149
|
+
node.mount.opts.fs.lookupPath(vfsPath);
|
|
7150
|
+
_js_wasm_trace(
|
|
7151
|
+
'backingNode for %s: %s',
|
|
7152
|
+
vfsPath,
|
|
7153
|
+
backingPath,
|
|
7154
|
+
backingNode
|
|
7155
|
+
);
|
|
7156
|
+
return backingNode.mount.type.realPath(backingNode);
|
|
7157
|
+
} else {
|
|
7158
|
+
throw new Error(
|
|
7159
|
+
`Unsupported filesystem type for path ${vfsPath}`
|
|
7160
|
+
);
|
|
7161
|
+
}
|
|
7152
7162
|
},
|
|
7153
7163
|
check_lock_params(fd, l_type) {
|
|
7154
7164
|
const emscripten_O_RDONLY = Number('0');
|
|
@@ -7348,6 +7358,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7348
7358
|
return -ERRNO_CODES.EBADF;
|
|
7349
7359
|
}
|
|
7350
7360
|
|
|
7361
|
+
const flockStructAddr = syscallGetVarargP();
|
|
7362
|
+
|
|
7351
7363
|
if (!locking.is_path_to_shared_fs(vfsPath)) {
|
|
7352
7364
|
_js_wasm_trace(
|
|
7353
7365
|
"fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
|
|
@@ -7363,7 +7375,6 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7363
7375
|
return 0;
|
|
7364
7376
|
}
|
|
7365
7377
|
|
|
7366
|
-
const flockStructAddr = syscallGetVarargP();
|
|
7367
7378
|
const flockStruct = read_flock_struct(flockStructAddr);
|
|
7368
7379
|
|
|
7369
7380
|
if (!(flockStruct.l_type in locking.fcntlToLockState)) {
|
|
@@ -8791,8 +8802,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
8791
8802
|
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
|
|
8792
8803
|
runtimeKeepalivePop();
|
|
8793
8804
|
callUserCallback(() =>
|
|
8794
|
-
((
|
|
8795
|
-
|
|
8805
|
+
((
|
|
8806
|
+
a1,
|
|
8807
|
+
a2
|
|
8808
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
8809
|
+
handle,
|
|
8796
8810
|
user_data
|
|
8797
8811
|
)
|
|
8798
8812
|
);
|
|
@@ -8800,8 +8814,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
8800
8814
|
function successCallback() {
|
|
8801
8815
|
runtimeKeepalivePop();
|
|
8802
8816
|
callUserCallback(() =>
|
|
8803
|
-
((
|
|
8804
|
-
|
|
8817
|
+
((
|
|
8818
|
+
a1,
|
|
8819
|
+
a2
|
|
8820
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
8821
|
+
handle,
|
|
8805
8822
|
user_data
|
|
8806
8823
|
)
|
|
8807
8824
|
);
|
|
@@ -19463,8 +19480,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
19463
19480
|
var trace = getCallstack();
|
|
19464
19481
|
var parts = trace.split('\n');
|
|
19465
19482
|
for (var i = 0; i < parts.length; i++) {
|
|
19466
|
-
var ret = ((
|
|
19467
|
-
|
|
19483
|
+
var ret = ((
|
|
19484
|
+
a1,
|
|
19485
|
+
a2
|
|
19486
|
+
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
19487
|
+
0,
|
|
19468
19488
|
arg
|
|
19469
19489
|
);
|
|
19470
19490
|
if (ret !== 0) return;
|
|
@@ -20040,8 +20060,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20040
20060
|
stringToUTF8(e.locale || '', keyEventData + 128, 32);
|
|
20041
20061
|
|
|
20042
20062
|
if (
|
|
20043
|
-
((
|
|
20044
|
-
|
|
20063
|
+
((
|
|
20064
|
+
a1,
|
|
20065
|
+
a2,
|
|
20066
|
+
a3
|
|
20067
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20068
|
+
eventTypeId,
|
|
20045
20069
|
keyEventData,
|
|
20046
20070
|
userData
|
|
20047
20071
|
)
|
|
@@ -20159,8 +20183,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20159
20183
|
fillMouseEventData(JSEvents.mouseEvent, e, target);
|
|
20160
20184
|
|
|
20161
20185
|
if (
|
|
20162
|
-
((
|
|
20163
|
-
|
|
20186
|
+
((
|
|
20187
|
+
a1,
|
|
20188
|
+
a2,
|
|
20189
|
+
a3
|
|
20190
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20191
|
+
eventTypeId,
|
|
20164
20192
|
JSEvents.mouseEvent,
|
|
20165
20193
|
userData
|
|
20166
20194
|
)
|
|
@@ -20374,8 +20402,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20374
20402
|
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
|
|
20375
20403
|
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
|
|
20376
20404
|
if (
|
|
20377
|
-
((
|
|
20378
|
-
|
|
20405
|
+
((
|
|
20406
|
+
a1,
|
|
20407
|
+
a2,
|
|
20408
|
+
a3
|
|
20409
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20410
|
+
eventTypeId,
|
|
20379
20411
|
wheelEvent,
|
|
20380
20412
|
userData
|
|
20381
20413
|
)
|
|
@@ -20456,8 +20488,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20456
20488
|
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
|
|
20457
20489
|
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
|
|
20458
20490
|
if (
|
|
20459
|
-
((
|
|
20460
|
-
|
|
20491
|
+
((
|
|
20492
|
+
a1,
|
|
20493
|
+
a2,
|
|
20494
|
+
a3
|
|
20495
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20496
|
+
eventTypeId,
|
|
20461
20497
|
uiEvent,
|
|
20462
20498
|
userData
|
|
20463
20499
|
)
|
|
@@ -20531,8 +20567,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20531
20567
|
stringToUTF8(id, focusEvent + 128, 128);
|
|
20532
20568
|
|
|
20533
20569
|
if (
|
|
20534
|
-
((
|
|
20535
|
-
|
|
20570
|
+
((
|
|
20571
|
+
a1,
|
|
20572
|
+
a2,
|
|
20573
|
+
a3
|
|
20574
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20575
|
+
eventTypeId,
|
|
20536
20576
|
focusEvent,
|
|
20537
20577
|
userData
|
|
20538
20578
|
)
|
|
@@ -20648,8 +20688,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20648
20688
|
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
|
|
20649
20689
|
|
|
20650
20690
|
if (
|
|
20651
|
-
((
|
|
20652
|
-
|
|
20691
|
+
((
|
|
20692
|
+
a1,
|
|
20693
|
+
a2,
|
|
20694
|
+
a3
|
|
20695
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20696
|
+
eventTypeId,
|
|
20653
20697
|
JSEvents.deviceOrientationEvent,
|
|
20654
20698
|
userData
|
|
20655
20699
|
)
|
|
@@ -20732,8 +20776,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20732
20776
|
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
|
|
20733
20777
|
|
|
20734
20778
|
if (
|
|
20735
|
-
((
|
|
20736
|
-
|
|
20779
|
+
((
|
|
20780
|
+
a1,
|
|
20781
|
+
a2,
|
|
20782
|
+
a3
|
|
20783
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20784
|
+
eventTypeId,
|
|
20737
20785
|
JSEvents.deviceMotionEvent,
|
|
20738
20786
|
userData
|
|
20739
20787
|
)
|
|
@@ -20843,8 +20891,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20843
20891
|
fillOrientationChangeEventData(orientationChangeEvent);
|
|
20844
20892
|
|
|
20845
20893
|
if (
|
|
20846
|
-
((
|
|
20847
|
-
|
|
20894
|
+
((
|
|
20895
|
+
a1,
|
|
20896
|
+
a2,
|
|
20897
|
+
a3
|
|
20898
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20899
|
+
eventTypeId,
|
|
20848
20900
|
orientationChangeEvent,
|
|
20849
20901
|
userData
|
|
20850
20902
|
)
|
|
@@ -20977,8 +21029,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20977
21029
|
fillFullscreenChangeEventData(fullscreenChangeEvent);
|
|
20978
21030
|
|
|
20979
21031
|
if (
|
|
20980
|
-
((
|
|
20981
|
-
|
|
21032
|
+
((
|
|
21033
|
+
a1,
|
|
21034
|
+
a2,
|
|
21035
|
+
a3
|
|
21036
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21037
|
+
eventTypeId,
|
|
20982
21038
|
fullscreenChangeEvent,
|
|
20983
21039
|
userData
|
|
20984
21040
|
)
|
|
@@ -21142,8 +21198,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21142
21198
|
);
|
|
21143
21199
|
|
|
21144
21200
|
if (currentFullscreenStrategy.canvasResizedCallback) {
|
|
21145
|
-
((
|
|
21146
|
-
|
|
21201
|
+
((
|
|
21202
|
+
a1,
|
|
21203
|
+
a2,
|
|
21204
|
+
a3
|
|
21205
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21206
|
+
37,
|
|
21147
21207
|
0,
|
|
21148
21208
|
currentFullscreenStrategy.canvasResizedCallbackUserData
|
|
21149
21209
|
);
|
|
@@ -21249,8 +21309,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21249
21309
|
currentFullscreenStrategy = strategy;
|
|
21250
21310
|
|
|
21251
21311
|
if (strategy.canvasResizedCallback) {
|
|
21252
|
-
((
|
|
21253
|
-
|
|
21312
|
+
((
|
|
21313
|
+
a1,
|
|
21314
|
+
a2,
|
|
21315
|
+
a3
|
|
21316
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21317
|
+
37,
|
|
21254
21318
|
0,
|
|
21255
21319
|
strategy.canvasResizedCallbackUserData
|
|
21256
21320
|
);
|
|
@@ -21352,8 +21416,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21352
21416
|
!inCenteredWithoutScalingFullscreenMode &&
|
|
21353
21417
|
currentFullscreenStrategy.canvasResizedCallback
|
|
21354
21418
|
) {
|
|
21355
|
-
((
|
|
21356
|
-
|
|
21419
|
+
((
|
|
21420
|
+
a1,
|
|
21421
|
+
a2,
|
|
21422
|
+
a3
|
|
21423
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21424
|
+
37,
|
|
21357
21425
|
0,
|
|
21358
21426
|
currentFullscreenStrategy.canvasResizedCallbackUserData
|
|
21359
21427
|
);
|
|
@@ -21452,8 +21520,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21452
21520
|
softFullscreenResizeWebGLRenderTarget
|
|
21453
21521
|
);
|
|
21454
21522
|
if (strategy.canvasResizedCallback) {
|
|
21455
|
-
((
|
|
21456
|
-
|
|
21523
|
+
((
|
|
21524
|
+
a1,
|
|
21525
|
+
a2,
|
|
21526
|
+
a3
|
|
21527
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21528
|
+
37,
|
|
21457
21529
|
0,
|
|
21458
21530
|
strategy.canvasResizedCallbackUserData
|
|
21459
21531
|
);
|
|
@@ -21466,8 +21538,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21466
21538
|
|
|
21467
21539
|
// Inform the caller that the canvas size has changed.
|
|
21468
21540
|
if (strategy.canvasResizedCallback) {
|
|
21469
|
-
((
|
|
21470
|
-
|
|
21541
|
+
((
|
|
21542
|
+
a1,
|
|
21543
|
+
a2,
|
|
21544
|
+
a3
|
|
21545
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21546
|
+
37,
|
|
21471
21547
|
0,
|
|
21472
21548
|
strategy.canvasResizedCallbackUserData
|
|
21473
21549
|
);
|
|
@@ -21535,8 +21611,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21535
21611
|
fillPointerlockChangeEventData(pointerlockChangeEvent);
|
|
21536
21612
|
|
|
21537
21613
|
if (
|
|
21538
|
-
((
|
|
21539
|
-
|
|
21614
|
+
((
|
|
21615
|
+
a1,
|
|
21616
|
+
a2,
|
|
21617
|
+
a3
|
|
21618
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21619
|
+
eventTypeId,
|
|
21540
21620
|
pointerlockChangeEvent,
|
|
21541
21621
|
userData
|
|
21542
21622
|
)
|
|
@@ -21626,8 +21706,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21626
21706
|
) => {
|
|
21627
21707
|
var pointerlockErrorEventHandlerFunc = (e = event) => {
|
|
21628
21708
|
if (
|
|
21629
|
-
((
|
|
21630
|
-
|
|
21709
|
+
((
|
|
21710
|
+
a1,
|
|
21711
|
+
a2,
|
|
21712
|
+
a3
|
|
21713
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21714
|
+
eventTypeId,
|
|
21631
21715
|
0,
|
|
21632
21716
|
userData
|
|
21633
21717
|
)
|
|
@@ -21827,8 +21911,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21827
21911
|
fillVisibilityChangeEventData(visibilityChangeEvent);
|
|
21828
21912
|
|
|
21829
21913
|
if (
|
|
21830
|
-
((
|
|
21831
|
-
|
|
21914
|
+
((
|
|
21915
|
+
a1,
|
|
21916
|
+
a2,
|
|
21917
|
+
a3
|
|
21918
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21919
|
+
eventTypeId,
|
|
21832
21920
|
visibilityChangeEvent,
|
|
21833
21921
|
userData
|
|
21834
21922
|
)
|
|
@@ -21948,8 +22036,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21948
22036
|
HEAP32[(touchEvent + 8) >> 2] = numTouches;
|
|
21949
22037
|
|
|
21950
22038
|
if (
|
|
21951
|
-
((
|
|
21952
|
-
|
|
22039
|
+
((
|
|
22040
|
+
a1,
|
|
22041
|
+
a2,
|
|
22042
|
+
a3
|
|
22043
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22044
|
+
eventTypeId,
|
|
21953
22045
|
touchEvent,
|
|
21954
22046
|
userData
|
|
21955
22047
|
)
|
|
@@ -22087,8 +22179,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22087
22179
|
fillGamepadEventData(gamepadEvent, e['gamepad']);
|
|
22088
22180
|
|
|
22089
22181
|
if (
|
|
22090
|
-
((
|
|
22091
|
-
|
|
22182
|
+
((
|
|
22183
|
+
a1,
|
|
22184
|
+
a2,
|
|
22185
|
+
a3
|
|
22186
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22187
|
+
eventTypeId,
|
|
22092
22188
|
gamepadEvent,
|
|
22093
22189
|
userData
|
|
22094
22190
|
)
|
|
@@ -22190,8 +22286,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22190
22286
|
) => {
|
|
22191
22287
|
var beforeUnloadEventHandlerFunc = (e = event) => {
|
|
22192
22288
|
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
|
|
22193
|
-
var confirmationMessage = ((
|
|
22194
|
-
|
|
22289
|
+
var confirmationMessage = ((
|
|
22290
|
+
a1,
|
|
22291
|
+
a2,
|
|
22292
|
+
a3
|
|
22293
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22294
|
+
eventTypeId,
|
|
22195
22295
|
0,
|
|
22196
22296
|
userData
|
|
22197
22297
|
);
|
|
@@ -22262,8 +22362,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22262
22362
|
fillBatteryEventData(batteryEvent, battery());
|
|
22263
22363
|
|
|
22264
22364
|
if (
|
|
22265
|
-
((
|
|
22266
|
-
|
|
22365
|
+
((
|
|
22366
|
+
a1,
|
|
22367
|
+
a2,
|
|
22368
|
+
a3
|
|
22369
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22370
|
+
eventTypeId,
|
|
22267
22371
|
batteryEvent,
|
|
22268
22372
|
userData
|
|
22269
22373
|
)
|
|
@@ -22353,8 +22457,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22353
22457
|
|
|
22354
22458
|
var _emscripten_request_animation_frame = (cb, userData) =>
|
|
22355
22459
|
requestAnimationFrame((timeStamp) =>
|
|
22356
|
-
((
|
|
22357
|
-
|
|
22460
|
+
((
|
|
22461
|
+
a1,
|
|
22462
|
+
a2
|
|
22463
|
+
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22464
|
+
timeStamp,
|
|
22358
22465
|
userData
|
|
22359
22466
|
)
|
|
22360
22467
|
);
|
|
@@ -22366,8 +22473,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22366
22473
|
var _emscripten_request_animation_frame_loop = (cb, userData) => {
|
|
22367
22474
|
function tick(timeStamp) {
|
|
22368
22475
|
if (
|
|
22369
|
-
((
|
|
22370
|
-
|
|
22476
|
+
((
|
|
22477
|
+
a1,
|
|
22478
|
+
a2
|
|
22479
|
+
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22480
|
+
timeStamp,
|
|
22371
22481
|
userData
|
|
22372
22482
|
)
|
|
22373
22483
|
) {
|
|
@@ -22592,8 +22702,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22592
22702
|
return emSetImmediate(() => {
|
|
22593
22703
|
runtimeKeepalivePop();
|
|
22594
22704
|
callUserCallback(() =>
|
|
22595
|
-
((
|
|
22596
|
-
|
|
22705
|
+
((
|
|
22706
|
+
a1
|
|
22707
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22708
|
+
userData
|
|
22597
22709
|
)
|
|
22598
22710
|
);
|
|
22599
22711
|
});
|
|
@@ -22610,8 +22722,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22610
22722
|
function tick() {
|
|
22611
22723
|
callUserCallback(() => {
|
|
22612
22724
|
if (
|
|
22613
|
-
((
|
|
22614
|
-
|
|
22725
|
+
((
|
|
22726
|
+
a1
|
|
22727
|
+
) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22728
|
+
userData
|
|
22615
22729
|
)
|
|
22616
22730
|
) {
|
|
22617
22731
|
emSetImmediate(tick);
|
|
@@ -22628,8 +22742,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22628
22742
|
var _emscripten_set_timeout = (cb, msecs, userData) =>
|
|
22629
22743
|
safeSetTimeout(
|
|
22630
22744
|
() =>
|
|
22631
|
-
((
|
|
22632
|
-
|
|
22745
|
+
((
|
|
22746
|
+
a1
|
|
22747
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22748
|
+
userData
|
|
22633
22749
|
),
|
|
22634
22750
|
msecs
|
|
22635
22751
|
);
|
|
@@ -22645,8 +22761,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22645
22761
|
runtimeKeepalivePop();
|
|
22646
22762
|
callUserCallback(() => {
|
|
22647
22763
|
if (
|
|
22648
|
-
((
|
|
22649
|
-
|
|
22764
|
+
((
|
|
22765
|
+
a1,
|
|
22766
|
+
a2
|
|
22767
|
+
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22768
|
+
t,
|
|
22650
22769
|
userData
|
|
22651
22770
|
)
|
|
22652
22771
|
) {
|
|
@@ -22670,8 +22789,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22670
22789
|
runtimeKeepalivePush();
|
|
22671
22790
|
return setInterval(() => {
|
|
22672
22791
|
callUserCallback(() =>
|
|
22673
|
-
((
|
|
22674
|
-
|
|
22792
|
+
((
|
|
22793
|
+
a1
|
|
22794
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22795
|
+
userData
|
|
22675
22796
|
)
|
|
22676
22797
|
);
|
|
22677
22798
|
}, msecs);
|
|
@@ -22686,8 +22807,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22686
22807
|
|
|
22687
22808
|
var _emscripten_async_call = (func, arg, millis) => {
|
|
22688
22809
|
var wrapper = () =>
|
|
22689
|
-
((
|
|
22690
|
-
|
|
22810
|
+
((
|
|
22811
|
+
a1
|
|
22812
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22813
|
+
arg
|
|
22691
22814
|
);
|
|
22692
22815
|
|
|
22693
22816
|
if (
|
|
@@ -22720,7 +22843,7 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22720
22843
|
|
|
22721
22844
|
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
|
|
22722
22845
|
var iterFunc =
|
|
22723
|
-
() => {}
|
|
22846
|
+
() => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
|
|
22724
22847
|
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
|
|
22725
22848
|
};
|
|
22726
22849
|
_emscripten_set_main_loop.sig = 'vpii';
|
|
@@ -22732,8 +22855,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22732
22855
|
simulateInfiniteLoop
|
|
22733
22856
|
) => {
|
|
22734
22857
|
var iterFunc = () =>
|
|
22735
|
-
((
|
|
22736
|
-
|
|
22858
|
+
((
|
|
22859
|
+
a1
|
|
22860
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22861
|
+
arg
|
|
22737
22862
|
);
|
|
22738
22863
|
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
|
|
22739
22864
|
};
|
|
@@ -22754,8 +22879,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22754
22879
|
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
|
|
22755
22880
|
MainLoop.queue.push({
|
|
22756
22881
|
func: () => {
|
|
22757
|
-
((
|
|
22758
|
-
|
|
22882
|
+
((
|
|
22883
|
+
a1
|
|
22884
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22885
|
+
arg
|
|
22759
22886
|
);
|
|
22760
22887
|
},
|
|
22761
22888
|
name: UTF8ToString(name),
|
|
@@ -22768,8 +22895,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22768
22895
|
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
|
|
22769
22896
|
MainLoop.queue.push({
|
|
22770
22897
|
func: () => {
|
|
22771
|
-
((
|
|
22772
|
-
|
|
22898
|
+
((
|
|
22899
|
+
a1
|
|
22900
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22901
|
+
arg
|
|
22773
22902
|
);
|
|
22774
22903
|
},
|
|
22775
22904
|
name: UTF8ToString(name),
|
|
@@ -22803,8 +22932,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22803
22932
|
var resultPtr = stackAlloc(POINTER_SIZE);
|
|
22804
22933
|
HEAPU32[resultPtr >> 2] = 0;
|
|
22805
22934
|
try {
|
|
22806
|
-
var result = ((
|
|
22807
|
-
|
|
22935
|
+
var result = ((
|
|
22936
|
+
a1,
|
|
22937
|
+
a2,
|
|
22938
|
+
a3
|
|
22939
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22940
|
+
resultPtr,
|
|
22808
22941
|
userData,
|
|
22809
22942
|
value
|
|
22810
22943
|
);
|
|
@@ -23740,15 +23873,19 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
23740
23873
|
() => {
|
|
23741
23874
|
runtimeKeepalivePop();
|
|
23742
23875
|
if (onload)
|
|
23743
|
-
((
|
|
23744
|
-
|
|
23876
|
+
((
|
|
23877
|
+
a1
|
|
23878
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23879
|
+
file
|
|
23745
23880
|
);
|
|
23746
23881
|
},
|
|
23747
23882
|
() => {
|
|
23748
23883
|
runtimeKeepalivePop();
|
|
23749
23884
|
if (onerror)
|
|
23750
|
-
((
|
|
23751
|
-
|
|
23885
|
+
((
|
|
23886
|
+
a1
|
|
23887
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23888
|
+
file
|
|
23752
23889
|
);
|
|
23753
23890
|
},
|
|
23754
23891
|
true // don'tCreateFile - it's already there
|
|
@@ -23782,16 +23919,21 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
23782
23919
|
() => {
|
|
23783
23920
|
runtimeKeepalivePop();
|
|
23784
23921
|
if (onload)
|
|
23785
|
-
((
|
|
23786
|
-
|
|
23922
|
+
((
|
|
23923
|
+
a1,
|
|
23924
|
+
a2
|
|
23925
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23926
|
+
arg,
|
|
23787
23927
|
cname
|
|
23788
23928
|
);
|
|
23789
23929
|
},
|
|
23790
23930
|
() => {
|
|
23791
23931
|
runtimeKeepalivePop();
|
|
23792
23932
|
if (onerror)
|
|
23793
|
-
((
|
|
23794
|
-
|
|
23933
|
+
((
|
|
23934
|
+
a1
|
|
23935
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23936
|
+
arg
|
|
23795
23937
|
);
|
|
23796
23938
|
},
|
|
23797
23939
|
true // don'tCreateFile - it's already there
|
|
@@ -24064,10 +24206,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24064
24206
|
runtimeKeepalivePop();
|
|
24065
24207
|
callUserCallback(() => {
|
|
24066
24208
|
var sp = stackSave();
|
|
24067
|
-
((
|
|
24068
|
-
|
|
24069
|
-
|
|
24070
|
-
)
|
|
24209
|
+
((
|
|
24210
|
+
a1
|
|
24211
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24212
|
+
stringToUTF8OnStack(_file)
|
|
24071
24213
|
);
|
|
24072
24214
|
stackRestore(sp);
|
|
24073
24215
|
});
|
|
@@ -24111,8 +24253,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24111
24253
|
callUserCallback(() => {
|
|
24112
24254
|
var buffer = _malloc(byteArray.length);
|
|
24113
24255
|
HEAPU8.set(byteArray, buffer);
|
|
24114
|
-
((
|
|
24115
|
-
|
|
24256
|
+
((
|
|
24257
|
+
a1,
|
|
24258
|
+
a2,
|
|
24259
|
+
a3
|
|
24260
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24261
|
+
userdata,
|
|
24116
24262
|
buffer,
|
|
24117
24263
|
byteArray.length
|
|
24118
24264
|
);
|
|
@@ -24122,8 +24268,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24122
24268
|
if (onerror) {
|
|
24123
24269
|
runtimeKeepalivePop();
|
|
24124
24270
|
callUserCallback(() => {
|
|
24125
|
-
((
|
|
24126
|
-
|
|
24271
|
+
((
|
|
24272
|
+
a1
|
|
24273
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24274
|
+
userdata
|
|
24127
24275
|
);
|
|
24128
24276
|
});
|
|
24129
24277
|
}
|
|
@@ -24180,8 +24328,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24180
24328
|
);
|
|
24181
24329
|
if (onload) {
|
|
24182
24330
|
var sp = stackSave();
|
|
24183
|
-
((
|
|
24184
|
-
|
|
24331
|
+
((
|
|
24332
|
+
a1,
|
|
24333
|
+
a2,
|
|
24334
|
+
a3
|
|
24335
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24336
|
+
handle,
|
|
24185
24337
|
userdata,
|
|
24186
24338
|
stringToUTF8OnStack(_file)
|
|
24187
24339
|
);
|
|
@@ -24189,8 +24341,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24189
24341
|
}
|
|
24190
24342
|
} else {
|
|
24191
24343
|
if (onerror)
|
|
24192
|
-
((
|
|
24193
|
-
|
|
24344
|
+
((
|
|
24345
|
+
a1,
|
|
24346
|
+
a2,
|
|
24347
|
+
a3
|
|
24348
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24349
|
+
handle,
|
|
24194
24350
|
userdata,
|
|
24195
24351
|
http.status
|
|
24196
24352
|
);
|
|
@@ -24203,8 +24359,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24203
24359
|
http.onerror = (e) => {
|
|
24204
24360
|
runtimeKeepalivePop();
|
|
24205
24361
|
if (onerror)
|
|
24206
|
-
((
|
|
24207
|
-
|
|
24362
|
+
((
|
|
24363
|
+
a1,
|
|
24364
|
+
a2,
|
|
24365
|
+
a3
|
|
24366
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24367
|
+
handle,
|
|
24208
24368
|
userdata,
|
|
24209
24369
|
http.status
|
|
24210
24370
|
);
|
|
@@ -24219,8 +24379,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24219
24379
|
) {
|
|
24220
24380
|
var percentComplete = (e.loaded / e.total) * 100;
|
|
24221
24381
|
if (onprogress)
|
|
24222
|
-
((
|
|
24223
|
-
|
|
24382
|
+
((
|
|
24383
|
+
a1,
|
|
24384
|
+
a2,
|
|
24385
|
+
a3
|
|
24386
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24387
|
+
handle,
|
|
24224
24388
|
userdata,
|
|
24225
24389
|
percentComplete
|
|
24226
24390
|
);
|
|
@@ -24277,8 +24441,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24277
24441
|
if (http.statusText) {
|
|
24278
24442
|
statusText = stringToUTF8OnStack(http.statusText);
|
|
24279
24443
|
}
|
|
24280
|
-
((
|
|
24281
|
-
|
|
24444
|
+
((
|
|
24445
|
+
a1,
|
|
24446
|
+
a2,
|
|
24447
|
+
a3,
|
|
24448
|
+
a4
|
|
24449
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24450
|
+
handle,
|
|
24282
24451
|
userdata,
|
|
24283
24452
|
http.status,
|
|
24284
24453
|
statusText
|
|
@@ -24299,8 +24468,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24299
24468
|
var buffer = _malloc(byteArray.length);
|
|
24300
24469
|
HEAPU8.set(byteArray, buffer);
|
|
24301
24470
|
if (onload)
|
|
24302
|
-
((
|
|
24303
|
-
|
|
24471
|
+
((
|
|
24472
|
+
a1,
|
|
24473
|
+
a2,
|
|
24474
|
+
a3,
|
|
24475
|
+
a4
|
|
24476
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24477
|
+
handle,
|
|
24304
24478
|
userdata,
|
|
24305
24479
|
buffer,
|
|
24306
24480
|
byteArray.length
|
|
@@ -24321,8 +24495,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24321
24495
|
// PROGRESS
|
|
24322
24496
|
http.onprogress = (e) => {
|
|
24323
24497
|
if (onprogress)
|
|
24324
|
-
((
|
|
24325
|
-
|
|
24498
|
+
((
|
|
24499
|
+
a1,
|
|
24500
|
+
a2,
|
|
24501
|
+
a3,
|
|
24502
|
+
a4
|
|
24503
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24504
|
+
handle,
|
|
24326
24505
|
userdata,
|
|
24327
24506
|
e.loaded,
|
|
24328
24507
|
e.lengthComputable || e.lengthComputable === undefined
|
|
@@ -24442,16 +24621,24 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24442
24621
|
if (event === 'error') {
|
|
24443
24622
|
withStackSave(() => {
|
|
24444
24623
|
var msg = stringToUTF8OnStack(data[2]);
|
|
24445
|
-
((
|
|
24446
|
-
|
|
24624
|
+
((
|
|
24625
|
+
a1,
|
|
24626
|
+
a2,
|
|
24627
|
+
a3,
|
|
24628
|
+
a4
|
|
24629
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24630
|
+
data[0],
|
|
24447
24631
|
data[1],
|
|
24448
24632
|
msg,
|
|
24449
24633
|
userData
|
|
24450
24634
|
);
|
|
24451
24635
|
});
|
|
24452
24636
|
} else {
|
|
24453
|
-
((
|
|
24454
|
-
|
|
24637
|
+
((
|
|
24638
|
+
a1,
|
|
24639
|
+
a2
|
|
24640
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24641
|
+
data,
|
|
24455
24642
|
userData
|
|
24456
24643
|
);
|
|
24457
24644
|
}
|
|
@@ -24917,8 +25104,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24917
25104
|
) => {
|
|
24918
25105
|
var webGlEventHandlerFunc = (e = event) => {
|
|
24919
25106
|
if (
|
|
24920
|
-
((
|
|
24921
|
-
|
|
25107
|
+
((
|
|
25108
|
+
a1,
|
|
25109
|
+
a2,
|
|
25110
|
+
a3
|
|
25111
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25112
|
+
eventTypeId,
|
|
24922
25113
|
0,
|
|
24923
25114
|
userData
|
|
24924
25115
|
)
|
|
@@ -25137,15 +25328,21 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25137
25328
|
) {
|
|
25138
25329
|
event.preventDefault();
|
|
25139
25330
|
GLUT.saveModifiers(event);
|
|
25140
|
-
((
|
|
25141
|
-
|
|
25331
|
+
((
|
|
25332
|
+
a1,
|
|
25333
|
+
a2
|
|
25334
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25335
|
+
lastX,
|
|
25142
25336
|
lastY
|
|
25143
25337
|
);
|
|
25144
25338
|
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
|
|
25145
25339
|
event.preventDefault();
|
|
25146
25340
|
GLUT.saveModifiers(event);
|
|
25147
|
-
((
|
|
25148
|
-
|
|
25341
|
+
((
|
|
25342
|
+
a1,
|
|
25343
|
+
a2
|
|
25344
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25345
|
+
lastX,
|
|
25149
25346
|
lastY
|
|
25150
25347
|
);
|
|
25151
25348
|
}
|
|
@@ -25306,8 +25503,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25306
25503
|
if (GLUT.specialFunc) {
|
|
25307
25504
|
event.preventDefault();
|
|
25308
25505
|
GLUT.saveModifiers(event);
|
|
25309
|
-
((
|
|
25310
|
-
|
|
25506
|
+
((
|
|
25507
|
+
a1,
|
|
25508
|
+
a2,
|
|
25509
|
+
a3
|
|
25510
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25511
|
+
key,
|
|
25311
25512
|
Browser.mouseX,
|
|
25312
25513
|
Browser.mouseY
|
|
25313
25514
|
);
|
|
@@ -25317,8 +25518,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25317
25518
|
if (key !== null && GLUT.keyboardFunc) {
|
|
25318
25519
|
event.preventDefault();
|
|
25319
25520
|
GLUT.saveModifiers(event);
|
|
25320
|
-
((
|
|
25321
|
-
|
|
25521
|
+
((
|
|
25522
|
+
a1,
|
|
25523
|
+
a2,
|
|
25524
|
+
a3
|
|
25525
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25526
|
+
key,
|
|
25322
25527
|
Browser.mouseX,
|
|
25323
25528
|
Browser.mouseY
|
|
25324
25529
|
);
|
|
@@ -25333,8 +25538,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25333
25538
|
if (GLUT.specialUpFunc) {
|
|
25334
25539
|
event.preventDefault();
|
|
25335
25540
|
GLUT.saveModifiers(event);
|
|
25336
|
-
((
|
|
25337
|
-
|
|
25541
|
+
((
|
|
25542
|
+
a1,
|
|
25543
|
+
a2,
|
|
25544
|
+
a3
|
|
25545
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25546
|
+
key,
|
|
25338
25547
|
Browser.mouseX,
|
|
25339
25548
|
Browser.mouseY
|
|
25340
25549
|
);
|
|
@@ -25344,8 +25553,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25344
25553
|
if (key !== null && GLUT.keyboardUpFunc) {
|
|
25345
25554
|
event.preventDefault();
|
|
25346
25555
|
GLUT.saveModifiers(event);
|
|
25347
|
-
((
|
|
25348
|
-
|
|
25556
|
+
((
|
|
25557
|
+
a1,
|
|
25558
|
+
a2,
|
|
25559
|
+
a3
|
|
25560
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25561
|
+
key,
|
|
25349
25562
|
Browser.mouseX,
|
|
25350
25563
|
Browser.mouseY
|
|
25351
25564
|
);
|
|
@@ -25409,10 +25622,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25409
25622
|
} catch (e) {}
|
|
25410
25623
|
event.preventDefault();
|
|
25411
25624
|
GLUT.saveModifiers(event);
|
|
25412
|
-
((
|
|
25413
|
-
|
|
25414
|
-
|
|
25415
|
-
|
|
25625
|
+
((
|
|
25626
|
+
a1,
|
|
25627
|
+
a2,
|
|
25628
|
+
a3,
|
|
25629
|
+
a4
|
|
25630
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25631
|
+
event['button'],
|
|
25416
25632
|
0 /*GLUT_DOWN*/,
|
|
25417
25633
|
Browser.mouseX,
|
|
25418
25634
|
Browser.mouseY
|
|
@@ -25427,10 +25643,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25427
25643
|
if (GLUT.mouseFunc) {
|
|
25428
25644
|
event.preventDefault();
|
|
25429
25645
|
GLUT.saveModifiers(event);
|
|
25430
|
-
((
|
|
25431
|
-
|
|
25432
|
-
|
|
25433
|
-
|
|
25646
|
+
((
|
|
25647
|
+
a1,
|
|
25648
|
+
a2,
|
|
25649
|
+
a3,
|
|
25650
|
+
a4
|
|
25651
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25652
|
+
event['button'],
|
|
25434
25653
|
1 /*GLUT_UP*/,
|
|
25435
25654
|
Browser.mouseX,
|
|
25436
25655
|
Browser.mouseY
|
|
@@ -25459,8 +25678,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25459
25678
|
if (GLUT.mouseFunc) {
|
|
25460
25679
|
event.preventDefault();
|
|
25461
25680
|
GLUT.saveModifiers(event);
|
|
25462
|
-
((
|
|
25463
|
-
|
|
25681
|
+
((
|
|
25682
|
+
a1,
|
|
25683
|
+
a2,
|
|
25684
|
+
a3,
|
|
25685
|
+
a4
|
|
25686
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25687
|
+
button,
|
|
25464
25688
|
0 /*GLUT_DOWN*/,
|
|
25465
25689
|
Browser.mouseX,
|
|
25466
25690
|
Browser.mouseY
|
|
@@ -25503,8 +25727,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25503
25727
|
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
|
|
25504
25728
|
if (GLUT.reshapeFunc) {
|
|
25505
25729
|
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
|
|
25506
|
-
((
|
|
25507
|
-
|
|
25730
|
+
((
|
|
25731
|
+
a1,
|
|
25732
|
+
a2
|
|
25733
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25734
|
+
width,
|
|
25508
25735
|
height
|
|
25509
25736
|
);
|
|
25510
25737
|
}
|
|
@@ -25547,8 +25774,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25547
25774
|
|
|
25548
25775
|
Browser.resizeListeners.push((width, height) => {
|
|
25549
25776
|
if (GLUT.reshapeFunc) {
|
|
25550
|
-
((
|
|
25551
|
-
|
|
25777
|
+
((
|
|
25778
|
+
a1,
|
|
25779
|
+
a2
|
|
25780
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25781
|
+
width,
|
|
25552
25782
|
height
|
|
25553
25783
|
);
|
|
25554
25784
|
}
|
|
@@ -25661,8 +25891,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25661
25891
|
var _glutTimerFunc = (msec, func, value) =>
|
|
25662
25892
|
safeSetTimeout(
|
|
25663
25893
|
() =>
|
|
25664
|
-
((
|
|
25665
|
-
|
|
25894
|
+
((
|
|
25895
|
+
a1
|
|
25896
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25897
|
+
value
|
|
25666
25898
|
),
|
|
25667
25899
|
msec
|
|
25668
25900
|
);
|
|
@@ -25822,8 +26054,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25822
26054
|
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
|
|
25823
26055
|
// Just call it once here.
|
|
25824
26056
|
if (GLUT.reshapeFunc) {
|
|
25825
|
-
((
|
|
25826
|
-
|
|
26057
|
+
((
|
|
26058
|
+
a1,
|
|
26059
|
+
a2
|
|
26060
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
26061
|
+
width,
|
|
25827
26062
|
height
|
|
25828
26063
|
);
|
|
25829
26064
|
}
|
|
@@ -26885,15 +27120,21 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26885
27120
|
callUserCallback(() => {
|
|
26886
27121
|
if (error) {
|
|
26887
27122
|
if (onerror)
|
|
26888
|
-
((
|
|
26889
|
-
|
|
27123
|
+
((
|
|
27124
|
+
a1
|
|
27125
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27126
|
+
arg
|
|
26890
27127
|
);
|
|
26891
27128
|
return;
|
|
26892
27129
|
}
|
|
26893
27130
|
var buffer = _malloc(byteArray.length);
|
|
26894
27131
|
HEAPU8.set(byteArray, buffer);
|
|
26895
|
-
((
|
|
26896
|
-
|
|
27132
|
+
((
|
|
27133
|
+
a1,
|
|
27134
|
+
a2,
|
|
27135
|
+
a3
|
|
27136
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27137
|
+
arg,
|
|
26897
27138
|
buffer,
|
|
26898
27139
|
byteArray.length
|
|
26899
27140
|
);
|
|
@@ -26925,14 +27166,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26925
27166
|
callUserCallback(() => {
|
|
26926
27167
|
if (error) {
|
|
26927
27168
|
if (onerror)
|
|
26928
|
-
((
|
|
26929
|
-
|
|
27169
|
+
((
|
|
27170
|
+
a1
|
|
27171
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27172
|
+
arg
|
|
26930
27173
|
);
|
|
26931
27174
|
return;
|
|
26932
27175
|
}
|
|
26933
27176
|
if (onstore)
|
|
26934
|
-
((
|
|
26935
|
-
|
|
27177
|
+
((
|
|
27178
|
+
a1
|
|
27179
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27180
|
+
arg
|
|
26936
27181
|
);
|
|
26937
27182
|
});
|
|
26938
27183
|
}
|
|
@@ -26947,14 +27192,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26947
27192
|
callUserCallback(() => {
|
|
26948
27193
|
if (error) {
|
|
26949
27194
|
if (onerror)
|
|
26950
|
-
((
|
|
26951
|
-
|
|
27195
|
+
((
|
|
27196
|
+
a1
|
|
27197
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27198
|
+
arg
|
|
26952
27199
|
);
|
|
26953
27200
|
return;
|
|
26954
27201
|
}
|
|
26955
27202
|
if (ondelete)
|
|
26956
|
-
((
|
|
26957
|
-
|
|
27203
|
+
((
|
|
27204
|
+
a1
|
|
27205
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27206
|
+
arg
|
|
26958
27207
|
);
|
|
26959
27208
|
});
|
|
26960
27209
|
});
|
|
@@ -26971,14 +27220,19 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26971
27220
|
callUserCallback(() => {
|
|
26972
27221
|
if (error) {
|
|
26973
27222
|
if (onerror)
|
|
26974
|
-
((
|
|
26975
|
-
|
|
27223
|
+
((
|
|
27224
|
+
a1
|
|
27225
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27226
|
+
arg
|
|
26976
27227
|
);
|
|
26977
27228
|
return;
|
|
26978
27229
|
}
|
|
26979
27230
|
if (oncheck)
|
|
26980
|
-
((
|
|
26981
|
-
|
|
27231
|
+
((
|
|
27232
|
+
a1,
|
|
27233
|
+
a2
|
|
27234
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27235
|
+
arg,
|
|
26982
27236
|
exists
|
|
26983
27237
|
);
|
|
26984
27238
|
});
|
|
@@ -26994,14 +27248,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26994
27248
|
callUserCallback(() => {
|
|
26995
27249
|
if (error) {
|
|
26996
27250
|
if (onerror)
|
|
26997
|
-
((
|
|
26998
|
-
|
|
27251
|
+
((
|
|
27252
|
+
a1
|
|
27253
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27254
|
+
arg
|
|
26999
27255
|
);
|
|
27000
27256
|
return;
|
|
27001
27257
|
}
|
|
27002
27258
|
if (onclear)
|
|
27003
|
-
((
|
|
27004
|
-
|
|
27259
|
+
((
|
|
27260
|
+
a1
|
|
27261
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27262
|
+
arg
|
|
27005
27263
|
);
|
|
27006
27264
|
});
|
|
27007
27265
|
});
|
|
@@ -27158,8 +27416,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27158
27416
|
safeSetTimeout(() => {
|
|
27159
27417
|
var stackBegin = Asyncify.currData + 12;
|
|
27160
27418
|
var stackEnd = HEAPU32[Asyncify.currData >> 2];
|
|
27161
|
-
((
|
|
27162
|
-
|
|
27419
|
+
((
|
|
27420
|
+
a1,
|
|
27421
|
+
a2
|
|
27422
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27423
|
+
stackBegin,
|
|
27163
27424
|
stackEnd
|
|
27164
27425
|
);
|
|
27165
27426
|
wakeUp();
|
|
@@ -27220,8 +27481,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27220
27481
|
HEAPU32[(newFiber + 12) >> 2] = 0;
|
|
27221
27482
|
|
|
27222
27483
|
var userData = HEAPU32[(newFiber + 16) >> 2];
|
|
27223
|
-
((
|
|
27224
|
-
|
|
27484
|
+
((
|
|
27485
|
+
a1
|
|
27486
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27487
|
+
userData
|
|
27225
27488
|
);
|
|
27226
27489
|
} else {
|
|
27227
27490
|
var asyncifyData = newFiber + 20;
|
|
@@ -28233,8 +28496,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
28233
28496
|
if (!SDL.eventHandler) return;
|
|
28234
28497
|
|
|
28235
28498
|
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
|
|
28236
|
-
((
|
|
28237
|
-
|
|
28499
|
+
((
|
|
28500
|
+
a1,
|
|
28501
|
+
a2
|
|
28502
|
+
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
28503
|
+
SDL.eventHandlerContext,
|
|
28238
28504
|
SDL.eventHandlerTemp
|
|
28239
28505
|
);
|
|
28240
28506
|
}
|
|
@@ -29867,9 +30133,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
29867
30133
|
return;
|
|
29868
30134
|
|
|
29869
30135
|
// Ask SDL audio data from the user code.
|
|
29870
|
-
((
|
|
29871
|
-
|
|
29872
|
-
|
|
30136
|
+
((
|
|
30137
|
+
a1,
|
|
30138
|
+
a2,
|
|
30139
|
+
a3
|
|
30140
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30141
|
+
SDL.audio.userdata,
|
|
29873
30142
|
SDL.audio.buffer,
|
|
29874
30143
|
SDL.audio.bufferSize
|
|
29875
30144
|
);
|
|
@@ -30327,8 +30596,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
30327
30596
|
info.audio = null;
|
|
30328
30597
|
}
|
|
30329
30598
|
if (SDL.channelFinished) {
|
|
30330
|
-
((
|
|
30331
|
-
|
|
30599
|
+
((
|
|
30600
|
+
a1
|
|
30601
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30602
|
+
channel
|
|
30332
30603
|
);
|
|
30333
30604
|
}
|
|
30334
30605
|
}
|
|
@@ -30397,8 +30668,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
30397
30668
|
channelInfo.audio = null;
|
|
30398
30669
|
}
|
|
30399
30670
|
if (SDL.channelFinished)
|
|
30400
|
-
((
|
|
30401
|
-
|
|
30671
|
+
((
|
|
30672
|
+
a1
|
|
30673
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30674
|
+
channel
|
|
30402
30675
|
);
|
|
30403
30676
|
};
|
|
30404
30677
|
if (channelInfo.audio) {
|
|
@@ -31146,8 +31419,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31146
31419
|
var _SDL_AddTimer = (interval, callback, param) =>
|
|
31147
31420
|
safeSetTimeout(
|
|
31148
31421
|
() =>
|
|
31149
|
-
((
|
|
31150
|
-
|
|
31422
|
+
((
|
|
31423
|
+
a1,
|
|
31424
|
+
a2
|
|
31425
|
+
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31426
|
+
interval,
|
|
31151
31427
|
param
|
|
31152
31428
|
),
|
|
31153
31429
|
interval
|
|
@@ -31526,8 +31802,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31526
31802
|
|
|
31527
31803
|
socket.onopen = function (e) {
|
|
31528
31804
|
var eventPtr = WS.getSocketEvent(socketId);
|
|
31529
|
-
((
|
|
31530
|
-
|
|
31805
|
+
((
|
|
31806
|
+
a1,
|
|
31807
|
+
a2,
|
|
31808
|
+
a3
|
|
31809
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31810
|
+
0 /*TODO*/,
|
|
31531
31811
|
eventPtr,
|
|
31532
31812
|
userData
|
|
31533
31813
|
);
|
|
@@ -31549,8 +31829,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31549
31829
|
|
|
31550
31830
|
socket.onerror = function (e) {
|
|
31551
31831
|
var eventPtr = WS.getSocketEvent(socketId);
|
|
31552
|
-
((
|
|
31553
|
-
|
|
31832
|
+
((
|
|
31833
|
+
a1,
|
|
31834
|
+
a2,
|
|
31835
|
+
a3
|
|
31836
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31837
|
+
0 /*TODO*/,
|
|
31554
31838
|
eventPtr,
|
|
31555
31839
|
userData
|
|
31556
31840
|
);
|
|
@@ -31575,8 +31859,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31575
31859
|
(HEAP8[eventPtr + 4] = e.wasClean),
|
|
31576
31860
|
(HEAP16[(eventPtr + 6) >> 1] = e.code),
|
|
31577
31861
|
stringToUTF8(e.reason, eventPtr + 8, 512);
|
|
31578
|
-
((
|
|
31579
|
-
|
|
31862
|
+
((
|
|
31863
|
+
a1,
|
|
31864
|
+
a2,
|
|
31865
|
+
a3
|
|
31866
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31867
|
+
0 /*TODO*/,
|
|
31580
31868
|
eventPtr,
|
|
31581
31869
|
userData
|
|
31582
31870
|
);
|
|
@@ -31610,8 +31898,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31610
31898
|
(HEAPU32[(eventPtr + 4) >> 2] = buf),
|
|
31611
31899
|
(HEAP32[(eventPtr + 8) >> 2] = len),
|
|
31612
31900
|
(HEAP8[eventPtr + 12] = isText),
|
|
31613
|
-
((
|
|
31614
|
-
|
|
31901
|
+
((
|
|
31902
|
+
a1,
|
|
31903
|
+
a2,
|
|
31904
|
+
a3
|
|
31905
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31906
|
+
0 /*TODO*/,
|
|
31615
31907
|
eventPtr,
|
|
31616
31908
|
userData
|
|
31617
31909
|
);
|
|
@@ -31808,13 +32100,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31808
32100
|
// End JS library code
|
|
31809
32101
|
|
|
31810
32102
|
var ASM_CONSTS = {
|
|
31811
|
-
|
|
32103
|
+
11138669: ($0) => {
|
|
31812
32104
|
if (!$0) {
|
|
31813
32105
|
AL.alcErr = 0xa004;
|
|
31814
32106
|
return 1;
|
|
31815
32107
|
}
|
|
31816
32108
|
},
|
|
31817
|
-
|
|
32109
|
+
11138717: ($0) => {
|
|
31818
32110
|
if (!AL.currentCtx) {
|
|
31819
32111
|
err('alGetProcAddress() called without a valid context');
|
|
31820
32112
|
return 1;
|
|
@@ -35365,19 +35657,16 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
35365
35657
|
// We override NODEFS.createNode() to add an `isSharedFS` flag to all NODEFS
|
|
35366
35658
|
// nodes. This way we can tell whether file-locking is needed and possible
|
|
35367
35659
|
// for an FS node, even if wrapped with PROXYFS.
|
|
35368
|
-
const
|
|
35660
|
+
const originalNodeFsCreateNode = NODEFS.createNode;
|
|
35369
35661
|
NODEFS.createNode = function createNodeWithSharedFlag() {
|
|
35370
|
-
const node =
|
|
35662
|
+
const node = originalNodeFsCreateNode.apply(NODEFS, arguments);
|
|
35371
35663
|
node.isSharedFS = true;
|
|
35372
35664
|
return node;
|
|
35373
35665
|
};
|
|
35374
35666
|
|
|
35375
35667
|
var originalHashAddNode = FS.hashAddNode;
|
|
35376
35668
|
FS.hashAddNode = function hashAddNodeIfNotSharedFS(node) {
|
|
35377
|
-
if (
|
|
35378
|
-
typeof locking === 'object' &&
|
|
35379
|
-
locking?.is_shared_fs_node(node)
|
|
35380
|
-
) {
|
|
35669
|
+
if (node?.isSharedFS) {
|
|
35381
35670
|
// Avoid caching shared VFS nodes so multiple instances
|
|
35382
35671
|
// can access the same underlying filesystem without
|
|
35383
35672
|
// conflicting caches.
|