@php-wasm/node 2.0.4 → 2.0.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/asyncify/7_2_34/php_7_2.wasm +0 -0
- package/asyncify/7_3_33/php_7_3.wasm +0 -0
- package/asyncify/7_4_33/php_7_4.wasm +0 -0
- package/asyncify/8_0_30/php_8_0.wasm +0 -0
- package/asyncify/8_1_33/php_8_1.wasm +0 -0
- package/asyncify/8_2_29/php_8_2.wasm +0 -0
- package/asyncify/8_3_23/php_8_3.wasm +0 -0
- package/asyncify/8_3_24/php_8_3.wasm +0 -0
- package/asyncify/8_4_10/php_8_4.wasm +0 -0
- package/asyncify/8_4_11/php_8_4.wasm +0 -0
- package/asyncify/php_7_2.js +512 -223
- package/asyncify/php_7_3.js +509 -220
- package/asyncify/php_7_4.js +516 -227
- package/asyncify/php_8_0.js +509 -220
- package/asyncify/php_8_1.js +509 -220
- package/asyncify/php_8_2.js +509 -220
- package/asyncify/php_8_3.js +519 -230
- package/asyncify/php_8_4.js +515 -226
- package/index.cjs +657 -1191
- package/index.js +657 -1191
- package/jspi/7_2_34/php_7_2.wasm +0 -0
- package/jspi/7_3_33/php_7_3.wasm +0 -0
- package/jspi/7_4_33/php_7_4.wasm +0 -0
- package/jspi/8_0_30/php_8_0.wasm +0 -0
- package/jspi/8_1_33/php_8_1.wasm +0 -0
- package/jspi/8_2_29/php_8_2.wasm +0 -0
- package/jspi/8_3_23/php_8_3.wasm +0 -0
- package/jspi/8_3_24/php_8_3.wasm +0 -0
- package/jspi/8_4_10/php_8_4.wasm +0 -0
- package/jspi/8_4_11/php_8_4.wasm +0 -0
- package/jspi/php_7_2.js +42 -36
- package/jspi/php_7_3.js +42 -36
- package/jspi/php_7_4.js +42 -36
- package/jspi/php_8_0.js +42 -36
- package/jspi/php_8_1.js +42 -36
- package/jspi/php_8_2.js +42 -36
- package/jspi/php_8_3.js +48 -42
- package/jspi/php_8_4.js +48 -42
- package/lib/file-lock-manager-for-node.d.ts +9 -2
- package/lib/load-runtime.d.ts +2 -1
- package/package.json +7 -7
package/asyncify/php_8_4.js
CHANGED
|
@@ -6,10 +6,10 @@ const require = createRequire(import.meta.url);
|
|
|
6
6
|
// Note: The path module is currently needed by code injected by the php-wasm Dockerfile.
|
|
7
7
|
import path from 'path';
|
|
8
8
|
|
|
9
|
-
const dependencyFilename = path.join(__dirname, '
|
|
9
|
+
const dependencyFilename = path.join(__dirname, '8_4_11', 'php_8_4.wasm');
|
|
10
10
|
export { dependencyFilename };
|
|
11
|
-
export const dependenciesTotalSize =
|
|
12
|
-
const phpVersionString = '8.4.
|
|
11
|
+
export const dependenciesTotalSize = 36942530;
|
|
12
|
+
const phpVersionString = '8.4.11';
|
|
13
13
|
export function init(RuntimeName, PHPLoader) {
|
|
14
14
|
// The rest of the code comes from the built php.js file and esm-suffix.js
|
|
15
15
|
// include: shell.js
|
|
@@ -995,7 +995,7 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
995
995
|
|
|
996
996
|
/** @type {WebAssembly.Table} */
|
|
997
997
|
var wasmTable = new WebAssembly.Table({
|
|
998
|
-
initial:
|
|
998
|
+
initial: 16955,
|
|
999
999
|
element: 'anyfunc',
|
|
1000
1000
|
});
|
|
1001
1001
|
var getWasmTableEntry = (funcPtr) => {
|
|
@@ -1774,8 +1774,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
1774
1774
|
);
|
|
1775
1775
|
|
|
1776
1776
|
var ___call_sighandler = (fp, sig) =>
|
|
1777
|
-
((
|
|
1778
|
-
|
|
1777
|
+
((
|
|
1778
|
+
a1
|
|
1779
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
1780
|
+
sig
|
|
1779
1781
|
);
|
|
1780
1782
|
___call_sighandler.sig = 'vpi';
|
|
1781
1783
|
|
|
@@ -7101,35 +7103,25 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7101
7103
|
1: 'exclusive',
|
|
7102
7104
|
2: 'unlocked',
|
|
7103
7105
|
},
|
|
7104
|
-
|
|
7105
|
-
|
|
7106
|
-
|
|
7107
|
-
|
|
7108
|
-
|
|
7109
|
-
|
|
7110
|
-
|
|
7111
|
-
|
|
7112
|
-
|
|
7113
|
-
|
|
7114
|
-
|
|
7106
|
+
is_path_to_shared_fs(path) {
|
|
7107
|
+
_js_wasm_trace('is_path_to_shared_fs(%s)', path);
|
|
7108
|
+
const { node } = FS.lookupPath(path, { noent_okay: true });
|
|
7109
|
+
if (node.mount.type !== PROXYFS) {
|
|
7110
|
+
return !!node.isSharedFS;
|
|
7111
|
+
}
|
|
7112
|
+
|
|
7113
|
+
// This looks like a PROXYFS node. Let's try a lookup.
|
|
7114
|
+
const nodePath = PROXYFS.realPath(node);
|
|
7115
|
+
const backingFs = node?.mount?.opts?.fs;
|
|
7116
|
+
if (backingFs) {
|
|
7117
|
+
// Tolerate ENOENT because looking up a MEMFS node by path always fails.
|
|
7118
|
+
const { node: backingNode } = backingFs.lookupPath(nodePath, {
|
|
7119
|
+
noent_okay: true,
|
|
7120
|
+
});
|
|
7121
|
+
return !!backingNode?.isSharedFS;
|
|
7115
7122
|
}
|
|
7116
7123
|
|
|
7117
|
-
|
|
7118
|
-
if (node.mount.type !== NODEFS) {
|
|
7119
|
-
return false;
|
|
7120
|
-
}
|
|
7121
|
-
const vfsPath = node.mount.type.realPath(node);
|
|
7122
|
-
try {
|
|
7123
|
-
const underlyingNode =
|
|
7124
|
-
node.mount.opts.fs.lookupPath(vfsPath)?.node;
|
|
7125
|
-
return !!underlyingNode?.isSharedFS;
|
|
7126
|
-
} catch (e) {
|
|
7127
|
-
return false;
|
|
7128
|
-
}
|
|
7129
|
-
},
|
|
7130
|
-
is_path_to_shared_fs(path) {
|
|
7131
|
-
const { node } = FS.lookupPath(path);
|
|
7132
|
-
return locking.is_shared_fs_node(node);
|
|
7124
|
+
return false;
|
|
7133
7125
|
},
|
|
7134
7126
|
get_fd_access_mode(fd) {
|
|
7135
7127
|
const emscripten_F_GETFL = Number('3');
|
|
@@ -7147,8 +7139,26 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7147
7139
|
}
|
|
7148
7140
|
},
|
|
7149
7141
|
get_native_path_from_vfs_path(vfsPath) {
|
|
7150
|
-
|
|
7151
|
-
|
|
7142
|
+
// TODO: Should there be a try/catch here?
|
|
7143
|
+
const { node } = FS.lookupPath(vfsPath, {});
|
|
7144
|
+
if (node.mount.type === NODEFS) {
|
|
7145
|
+
return NODEFS.realPath(node);
|
|
7146
|
+
} else if (node.mount.type === PROXYFS) {
|
|
7147
|
+
// TODO: Tolerate ENOENT here?
|
|
7148
|
+
const { node: backingNode, path: backingPath } =
|
|
7149
|
+
node.mount.opts.fs.lookupPath(vfsPath);
|
|
7150
|
+
_js_wasm_trace(
|
|
7151
|
+
'backingNode for %s: %s',
|
|
7152
|
+
vfsPath,
|
|
7153
|
+
backingPath,
|
|
7154
|
+
backingNode
|
|
7155
|
+
);
|
|
7156
|
+
return backingNode.mount.type.realPath(backingNode);
|
|
7157
|
+
} else {
|
|
7158
|
+
throw new Error(
|
|
7159
|
+
`Unsupported filesystem type for path ${vfsPath}`
|
|
7160
|
+
);
|
|
7161
|
+
}
|
|
7152
7162
|
},
|
|
7153
7163
|
check_lock_params(fd, l_type) {
|
|
7154
7164
|
const emscripten_O_RDONLY = Number('0');
|
|
@@ -7348,6 +7358,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7348
7358
|
return -ERRNO_CODES.EBADF;
|
|
7349
7359
|
}
|
|
7350
7360
|
|
|
7361
|
+
const flockStructAddr = syscallGetVarargP();
|
|
7362
|
+
|
|
7351
7363
|
if (!locking.is_path_to_shared_fs(vfsPath)) {
|
|
7352
7364
|
_js_wasm_trace(
|
|
7353
7365
|
"fcntl(%d, F_GETLK) locking is not implemented for non-NodeFS path '%s'",
|
|
@@ -7363,7 +7375,6 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
7363
7375
|
return 0;
|
|
7364
7376
|
}
|
|
7365
7377
|
|
|
7366
|
-
const flockStructAddr = syscallGetVarargP();
|
|
7367
7378
|
const flockStruct = read_flock_struct(flockStructAddr);
|
|
7368
7379
|
|
|
7369
7380
|
if (!(flockStruct.l_type in locking.fcntlToLockState)) {
|
|
@@ -8791,8 +8802,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
8791
8802
|
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
|
|
8792
8803
|
runtimeKeepalivePop();
|
|
8793
8804
|
callUserCallback(() =>
|
|
8794
|
-
((
|
|
8795
|
-
|
|
8805
|
+
((
|
|
8806
|
+
a1,
|
|
8807
|
+
a2
|
|
8808
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
8809
|
+
handle,
|
|
8796
8810
|
user_data
|
|
8797
8811
|
)
|
|
8798
8812
|
);
|
|
@@ -8800,8 +8814,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
8800
8814
|
function successCallback() {
|
|
8801
8815
|
runtimeKeepalivePop();
|
|
8802
8816
|
callUserCallback(() =>
|
|
8803
|
-
((
|
|
8804
|
-
|
|
8817
|
+
((
|
|
8818
|
+
a1,
|
|
8819
|
+
a2
|
|
8820
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
8821
|
+
handle,
|
|
8805
8822
|
user_data
|
|
8806
8823
|
)
|
|
8807
8824
|
);
|
|
@@ -19471,8 +19488,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
19471
19488
|
var trace = getCallstack();
|
|
19472
19489
|
var parts = trace.split('\n');
|
|
19473
19490
|
for (var i = 0; i < parts.length; i++) {
|
|
19474
|
-
var ret = ((
|
|
19475
|
-
|
|
19491
|
+
var ret = ((
|
|
19492
|
+
a1,
|
|
19493
|
+
a2
|
|
19494
|
+
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
19495
|
+
0,
|
|
19476
19496
|
arg
|
|
19477
19497
|
);
|
|
19478
19498
|
if (ret !== 0) return;
|
|
@@ -20048,8 +20068,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20048
20068
|
stringToUTF8(e.locale || '', keyEventData + 128, 32);
|
|
20049
20069
|
|
|
20050
20070
|
if (
|
|
20051
|
-
((
|
|
20052
|
-
|
|
20071
|
+
((
|
|
20072
|
+
a1,
|
|
20073
|
+
a2,
|
|
20074
|
+
a3
|
|
20075
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20076
|
+
eventTypeId,
|
|
20053
20077
|
keyEventData,
|
|
20054
20078
|
userData
|
|
20055
20079
|
)
|
|
@@ -20167,8 +20191,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20167
20191
|
fillMouseEventData(JSEvents.mouseEvent, e, target);
|
|
20168
20192
|
|
|
20169
20193
|
if (
|
|
20170
|
-
((
|
|
20171
|
-
|
|
20194
|
+
((
|
|
20195
|
+
a1,
|
|
20196
|
+
a2,
|
|
20197
|
+
a3
|
|
20198
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20199
|
+
eventTypeId,
|
|
20172
20200
|
JSEvents.mouseEvent,
|
|
20173
20201
|
userData
|
|
20174
20202
|
)
|
|
@@ -20382,8 +20410,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20382
20410
|
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
|
|
20383
20411
|
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
|
|
20384
20412
|
if (
|
|
20385
|
-
((
|
|
20386
|
-
|
|
20413
|
+
((
|
|
20414
|
+
a1,
|
|
20415
|
+
a2,
|
|
20416
|
+
a3
|
|
20417
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20418
|
+
eventTypeId,
|
|
20387
20419
|
wheelEvent,
|
|
20388
20420
|
userData
|
|
20389
20421
|
)
|
|
@@ -20464,8 +20496,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20464
20496
|
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
|
|
20465
20497
|
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
|
|
20466
20498
|
if (
|
|
20467
|
-
((
|
|
20468
|
-
|
|
20499
|
+
((
|
|
20500
|
+
a1,
|
|
20501
|
+
a2,
|
|
20502
|
+
a3
|
|
20503
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20504
|
+
eventTypeId,
|
|
20469
20505
|
uiEvent,
|
|
20470
20506
|
userData
|
|
20471
20507
|
)
|
|
@@ -20539,8 +20575,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20539
20575
|
stringToUTF8(id, focusEvent + 128, 128);
|
|
20540
20576
|
|
|
20541
20577
|
if (
|
|
20542
|
-
((
|
|
20543
|
-
|
|
20578
|
+
((
|
|
20579
|
+
a1,
|
|
20580
|
+
a2,
|
|
20581
|
+
a3
|
|
20582
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20583
|
+
eventTypeId,
|
|
20544
20584
|
focusEvent,
|
|
20545
20585
|
userData
|
|
20546
20586
|
)
|
|
@@ -20656,8 +20696,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20656
20696
|
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
|
|
20657
20697
|
|
|
20658
20698
|
if (
|
|
20659
|
-
((
|
|
20660
|
-
|
|
20699
|
+
((
|
|
20700
|
+
a1,
|
|
20701
|
+
a2,
|
|
20702
|
+
a3
|
|
20703
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20704
|
+
eventTypeId,
|
|
20661
20705
|
JSEvents.deviceOrientationEvent,
|
|
20662
20706
|
userData
|
|
20663
20707
|
)
|
|
@@ -20740,8 +20784,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20740
20784
|
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
|
|
20741
20785
|
|
|
20742
20786
|
if (
|
|
20743
|
-
((
|
|
20744
|
-
|
|
20787
|
+
((
|
|
20788
|
+
a1,
|
|
20789
|
+
a2,
|
|
20790
|
+
a3
|
|
20791
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20792
|
+
eventTypeId,
|
|
20745
20793
|
JSEvents.deviceMotionEvent,
|
|
20746
20794
|
userData
|
|
20747
20795
|
)
|
|
@@ -20851,8 +20899,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20851
20899
|
fillOrientationChangeEventData(orientationChangeEvent);
|
|
20852
20900
|
|
|
20853
20901
|
if (
|
|
20854
|
-
((
|
|
20855
|
-
|
|
20902
|
+
((
|
|
20903
|
+
a1,
|
|
20904
|
+
a2,
|
|
20905
|
+
a3
|
|
20906
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20907
|
+
eventTypeId,
|
|
20856
20908
|
orientationChangeEvent,
|
|
20857
20909
|
userData
|
|
20858
20910
|
)
|
|
@@ -20985,8 +21037,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20985
21037
|
fillFullscreenChangeEventData(fullscreenChangeEvent);
|
|
20986
21038
|
|
|
20987
21039
|
if (
|
|
20988
|
-
((
|
|
20989
|
-
|
|
21040
|
+
((
|
|
21041
|
+
a1,
|
|
21042
|
+
a2,
|
|
21043
|
+
a3
|
|
21044
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21045
|
+
eventTypeId,
|
|
20990
21046
|
fullscreenChangeEvent,
|
|
20991
21047
|
userData
|
|
20992
21048
|
)
|
|
@@ -21150,8 +21206,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21150
21206
|
);
|
|
21151
21207
|
|
|
21152
21208
|
if (currentFullscreenStrategy.canvasResizedCallback) {
|
|
21153
|
-
((
|
|
21154
|
-
|
|
21209
|
+
((
|
|
21210
|
+
a1,
|
|
21211
|
+
a2,
|
|
21212
|
+
a3
|
|
21213
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21214
|
+
37,
|
|
21155
21215
|
0,
|
|
21156
21216
|
currentFullscreenStrategy.canvasResizedCallbackUserData
|
|
21157
21217
|
);
|
|
@@ -21257,8 +21317,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21257
21317
|
currentFullscreenStrategy = strategy;
|
|
21258
21318
|
|
|
21259
21319
|
if (strategy.canvasResizedCallback) {
|
|
21260
|
-
((
|
|
21261
|
-
|
|
21320
|
+
((
|
|
21321
|
+
a1,
|
|
21322
|
+
a2,
|
|
21323
|
+
a3
|
|
21324
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21325
|
+
37,
|
|
21262
21326
|
0,
|
|
21263
21327
|
strategy.canvasResizedCallbackUserData
|
|
21264
21328
|
);
|
|
@@ -21360,8 +21424,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21360
21424
|
!inCenteredWithoutScalingFullscreenMode &&
|
|
21361
21425
|
currentFullscreenStrategy.canvasResizedCallback
|
|
21362
21426
|
) {
|
|
21363
|
-
((
|
|
21364
|
-
|
|
21427
|
+
((
|
|
21428
|
+
a1,
|
|
21429
|
+
a2,
|
|
21430
|
+
a3
|
|
21431
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21432
|
+
37,
|
|
21365
21433
|
0,
|
|
21366
21434
|
currentFullscreenStrategy.canvasResizedCallbackUserData
|
|
21367
21435
|
);
|
|
@@ -21460,8 +21528,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21460
21528
|
softFullscreenResizeWebGLRenderTarget
|
|
21461
21529
|
);
|
|
21462
21530
|
if (strategy.canvasResizedCallback) {
|
|
21463
|
-
((
|
|
21464
|
-
|
|
21531
|
+
((
|
|
21532
|
+
a1,
|
|
21533
|
+
a2,
|
|
21534
|
+
a3
|
|
21535
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21536
|
+
37,
|
|
21465
21537
|
0,
|
|
21466
21538
|
strategy.canvasResizedCallbackUserData
|
|
21467
21539
|
);
|
|
@@ -21474,8 +21546,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21474
21546
|
|
|
21475
21547
|
// Inform the caller that the canvas size has changed.
|
|
21476
21548
|
if (strategy.canvasResizedCallback) {
|
|
21477
|
-
((
|
|
21478
|
-
|
|
21549
|
+
((
|
|
21550
|
+
a1,
|
|
21551
|
+
a2,
|
|
21552
|
+
a3
|
|
21553
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21554
|
+
37,
|
|
21479
21555
|
0,
|
|
21480
21556
|
strategy.canvasResizedCallbackUserData
|
|
21481
21557
|
);
|
|
@@ -21543,8 +21619,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21543
21619
|
fillPointerlockChangeEventData(pointerlockChangeEvent);
|
|
21544
21620
|
|
|
21545
21621
|
if (
|
|
21546
|
-
((
|
|
21547
|
-
|
|
21622
|
+
((
|
|
21623
|
+
a1,
|
|
21624
|
+
a2,
|
|
21625
|
+
a3
|
|
21626
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21627
|
+
eventTypeId,
|
|
21548
21628
|
pointerlockChangeEvent,
|
|
21549
21629
|
userData
|
|
21550
21630
|
)
|
|
@@ -21634,8 +21714,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21634
21714
|
) => {
|
|
21635
21715
|
var pointerlockErrorEventHandlerFunc = (e = event) => {
|
|
21636
21716
|
if (
|
|
21637
|
-
((
|
|
21638
|
-
|
|
21717
|
+
((
|
|
21718
|
+
a1,
|
|
21719
|
+
a2,
|
|
21720
|
+
a3
|
|
21721
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21722
|
+
eventTypeId,
|
|
21639
21723
|
0,
|
|
21640
21724
|
userData
|
|
21641
21725
|
)
|
|
@@ -21835,8 +21919,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21835
21919
|
fillVisibilityChangeEventData(visibilityChangeEvent);
|
|
21836
21920
|
|
|
21837
21921
|
if (
|
|
21838
|
-
((
|
|
21839
|
-
|
|
21922
|
+
((
|
|
21923
|
+
a1,
|
|
21924
|
+
a2,
|
|
21925
|
+
a3
|
|
21926
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21927
|
+
eventTypeId,
|
|
21840
21928
|
visibilityChangeEvent,
|
|
21841
21929
|
userData
|
|
21842
21930
|
)
|
|
@@ -21956,8 +22044,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21956
22044
|
HEAP32[(touchEvent + 8) >> 2] = numTouches;
|
|
21957
22045
|
|
|
21958
22046
|
if (
|
|
21959
|
-
((
|
|
21960
|
-
|
|
22047
|
+
((
|
|
22048
|
+
a1,
|
|
22049
|
+
a2,
|
|
22050
|
+
a3
|
|
22051
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22052
|
+
eventTypeId,
|
|
21961
22053
|
touchEvent,
|
|
21962
22054
|
userData
|
|
21963
22055
|
)
|
|
@@ -22095,8 +22187,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22095
22187
|
fillGamepadEventData(gamepadEvent, e['gamepad']);
|
|
22096
22188
|
|
|
22097
22189
|
if (
|
|
22098
|
-
((
|
|
22099
|
-
|
|
22190
|
+
((
|
|
22191
|
+
a1,
|
|
22192
|
+
a2,
|
|
22193
|
+
a3
|
|
22194
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22195
|
+
eventTypeId,
|
|
22100
22196
|
gamepadEvent,
|
|
22101
22197
|
userData
|
|
22102
22198
|
)
|
|
@@ -22198,8 +22294,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22198
22294
|
) => {
|
|
22199
22295
|
var beforeUnloadEventHandlerFunc = (e = event) => {
|
|
22200
22296
|
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
|
|
22201
|
-
var confirmationMessage = ((
|
|
22202
|
-
|
|
22297
|
+
var confirmationMessage = ((
|
|
22298
|
+
a1,
|
|
22299
|
+
a2,
|
|
22300
|
+
a3
|
|
22301
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22302
|
+
eventTypeId,
|
|
22203
22303
|
0,
|
|
22204
22304
|
userData
|
|
22205
22305
|
);
|
|
@@ -22270,8 +22370,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22270
22370
|
fillBatteryEventData(batteryEvent, battery());
|
|
22271
22371
|
|
|
22272
22372
|
if (
|
|
22273
|
-
((
|
|
22274
|
-
|
|
22373
|
+
((
|
|
22374
|
+
a1,
|
|
22375
|
+
a2,
|
|
22376
|
+
a3
|
|
22377
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22378
|
+
eventTypeId,
|
|
22275
22379
|
batteryEvent,
|
|
22276
22380
|
userData
|
|
22277
22381
|
)
|
|
@@ -22361,8 +22465,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22361
22465
|
|
|
22362
22466
|
var _emscripten_request_animation_frame = (cb, userData) =>
|
|
22363
22467
|
requestAnimationFrame((timeStamp) =>
|
|
22364
|
-
((
|
|
22365
|
-
|
|
22468
|
+
((
|
|
22469
|
+
a1,
|
|
22470
|
+
a2
|
|
22471
|
+
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22472
|
+
timeStamp,
|
|
22366
22473
|
userData
|
|
22367
22474
|
)
|
|
22368
22475
|
);
|
|
@@ -22374,8 +22481,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22374
22481
|
var _emscripten_request_animation_frame_loop = (cb, userData) => {
|
|
22375
22482
|
function tick(timeStamp) {
|
|
22376
22483
|
if (
|
|
22377
|
-
((
|
|
22378
|
-
|
|
22484
|
+
((
|
|
22485
|
+
a1,
|
|
22486
|
+
a2
|
|
22487
|
+
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22488
|
+
timeStamp,
|
|
22379
22489
|
userData
|
|
22380
22490
|
)
|
|
22381
22491
|
) {
|
|
@@ -22600,8 +22710,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22600
22710
|
return emSetImmediate(() => {
|
|
22601
22711
|
runtimeKeepalivePop();
|
|
22602
22712
|
callUserCallback(() =>
|
|
22603
|
-
((
|
|
22604
|
-
|
|
22713
|
+
((
|
|
22714
|
+
a1
|
|
22715
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22716
|
+
userData
|
|
22605
22717
|
)
|
|
22606
22718
|
);
|
|
22607
22719
|
});
|
|
@@ -22618,8 +22730,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22618
22730
|
function tick() {
|
|
22619
22731
|
callUserCallback(() => {
|
|
22620
22732
|
if (
|
|
22621
|
-
((
|
|
22622
|
-
|
|
22733
|
+
((
|
|
22734
|
+
a1
|
|
22735
|
+
) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22736
|
+
userData
|
|
22623
22737
|
)
|
|
22624
22738
|
) {
|
|
22625
22739
|
emSetImmediate(tick);
|
|
@@ -22636,8 +22750,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22636
22750
|
var _emscripten_set_timeout = (cb, msecs, userData) =>
|
|
22637
22751
|
safeSetTimeout(
|
|
22638
22752
|
() =>
|
|
22639
|
-
((
|
|
22640
|
-
|
|
22753
|
+
((
|
|
22754
|
+
a1
|
|
22755
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22756
|
+
userData
|
|
22641
22757
|
),
|
|
22642
22758
|
msecs
|
|
22643
22759
|
);
|
|
@@ -22653,8 +22769,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22653
22769
|
runtimeKeepalivePop();
|
|
22654
22770
|
callUserCallback(() => {
|
|
22655
22771
|
if (
|
|
22656
|
-
((
|
|
22657
|
-
|
|
22772
|
+
((
|
|
22773
|
+
a1,
|
|
22774
|
+
a2
|
|
22775
|
+
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22776
|
+
t,
|
|
22658
22777
|
userData
|
|
22659
22778
|
)
|
|
22660
22779
|
) {
|
|
@@ -22678,8 +22797,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22678
22797
|
runtimeKeepalivePush();
|
|
22679
22798
|
return setInterval(() => {
|
|
22680
22799
|
callUserCallback(() =>
|
|
22681
|
-
((
|
|
22682
|
-
|
|
22800
|
+
((
|
|
22801
|
+
a1
|
|
22802
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22803
|
+
userData
|
|
22683
22804
|
)
|
|
22684
22805
|
);
|
|
22685
22806
|
}, msecs);
|
|
@@ -22694,8 +22815,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22694
22815
|
|
|
22695
22816
|
var _emscripten_async_call = (func, arg, millis) => {
|
|
22696
22817
|
var wrapper = () =>
|
|
22697
|
-
((
|
|
22698
|
-
|
|
22818
|
+
((
|
|
22819
|
+
a1
|
|
22820
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22821
|
+
arg
|
|
22699
22822
|
);
|
|
22700
22823
|
|
|
22701
22824
|
if (
|
|
@@ -22728,7 +22851,7 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22728
22851
|
|
|
22729
22852
|
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
|
|
22730
22853
|
var iterFunc =
|
|
22731
|
-
() => {}
|
|
22854
|
+
() => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */;
|
|
22732
22855
|
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
|
|
22733
22856
|
};
|
|
22734
22857
|
_emscripten_set_main_loop.sig = 'vpii';
|
|
@@ -22740,8 +22863,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22740
22863
|
simulateInfiniteLoop
|
|
22741
22864
|
) => {
|
|
22742
22865
|
var iterFunc = () =>
|
|
22743
|
-
((
|
|
22744
|
-
|
|
22866
|
+
((
|
|
22867
|
+
a1
|
|
22868
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22869
|
+
arg
|
|
22745
22870
|
);
|
|
22746
22871
|
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
|
|
22747
22872
|
};
|
|
@@ -22762,8 +22887,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22762
22887
|
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
|
|
22763
22888
|
MainLoop.queue.push({
|
|
22764
22889
|
func: () => {
|
|
22765
|
-
((
|
|
22766
|
-
|
|
22890
|
+
((
|
|
22891
|
+
a1
|
|
22892
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22893
|
+
arg
|
|
22767
22894
|
);
|
|
22768
22895
|
},
|
|
22769
22896
|
name: UTF8ToString(name),
|
|
@@ -22776,8 +22903,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22776
22903
|
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
|
|
22777
22904
|
MainLoop.queue.push({
|
|
22778
22905
|
func: () => {
|
|
22779
|
-
((
|
|
22780
|
-
|
|
22906
|
+
((
|
|
22907
|
+
a1
|
|
22908
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22909
|
+
arg
|
|
22781
22910
|
);
|
|
22782
22911
|
},
|
|
22783
22912
|
name: UTF8ToString(name),
|
|
@@ -22811,8 +22940,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22811
22940
|
var resultPtr = stackAlloc(POINTER_SIZE);
|
|
22812
22941
|
HEAPU32[resultPtr >> 2] = 0;
|
|
22813
22942
|
try {
|
|
22814
|
-
var result = ((
|
|
22815
|
-
|
|
22943
|
+
var result = ((
|
|
22944
|
+
a1,
|
|
22945
|
+
a2,
|
|
22946
|
+
a3
|
|
22947
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22948
|
+
resultPtr,
|
|
22816
22949
|
userData,
|
|
22817
22950
|
value
|
|
22818
22951
|
);
|
|
@@ -23748,15 +23881,19 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
23748
23881
|
() => {
|
|
23749
23882
|
runtimeKeepalivePop();
|
|
23750
23883
|
if (onload)
|
|
23751
|
-
((
|
|
23752
|
-
|
|
23884
|
+
((
|
|
23885
|
+
a1
|
|
23886
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23887
|
+
file
|
|
23753
23888
|
);
|
|
23754
23889
|
},
|
|
23755
23890
|
() => {
|
|
23756
23891
|
runtimeKeepalivePop();
|
|
23757
23892
|
if (onerror)
|
|
23758
|
-
((
|
|
23759
|
-
|
|
23893
|
+
((
|
|
23894
|
+
a1
|
|
23895
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23896
|
+
file
|
|
23760
23897
|
);
|
|
23761
23898
|
},
|
|
23762
23899
|
true // don'tCreateFile - it's already there
|
|
@@ -23790,16 +23927,21 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
23790
23927
|
() => {
|
|
23791
23928
|
runtimeKeepalivePop();
|
|
23792
23929
|
if (onload)
|
|
23793
|
-
((
|
|
23794
|
-
|
|
23930
|
+
((
|
|
23931
|
+
a1,
|
|
23932
|
+
a2
|
|
23933
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23934
|
+
arg,
|
|
23795
23935
|
cname
|
|
23796
23936
|
);
|
|
23797
23937
|
},
|
|
23798
23938
|
() => {
|
|
23799
23939
|
runtimeKeepalivePop();
|
|
23800
23940
|
if (onerror)
|
|
23801
|
-
((
|
|
23802
|
-
|
|
23941
|
+
((
|
|
23942
|
+
a1
|
|
23943
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23944
|
+
arg
|
|
23803
23945
|
);
|
|
23804
23946
|
},
|
|
23805
23947
|
true // don'tCreateFile - it's already there
|
|
@@ -24072,10 +24214,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24072
24214
|
runtimeKeepalivePop();
|
|
24073
24215
|
callUserCallback(() => {
|
|
24074
24216
|
var sp = stackSave();
|
|
24075
|
-
((
|
|
24076
|
-
|
|
24077
|
-
|
|
24078
|
-
)
|
|
24217
|
+
((
|
|
24218
|
+
a1
|
|
24219
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24220
|
+
stringToUTF8OnStack(_file)
|
|
24079
24221
|
);
|
|
24080
24222
|
stackRestore(sp);
|
|
24081
24223
|
});
|
|
@@ -24119,8 +24261,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24119
24261
|
callUserCallback(() => {
|
|
24120
24262
|
var buffer = _malloc(byteArray.length);
|
|
24121
24263
|
HEAPU8.set(byteArray, buffer);
|
|
24122
|
-
((
|
|
24123
|
-
|
|
24264
|
+
((
|
|
24265
|
+
a1,
|
|
24266
|
+
a2,
|
|
24267
|
+
a3
|
|
24268
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24269
|
+
userdata,
|
|
24124
24270
|
buffer,
|
|
24125
24271
|
byteArray.length
|
|
24126
24272
|
);
|
|
@@ -24130,8 +24276,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24130
24276
|
if (onerror) {
|
|
24131
24277
|
runtimeKeepalivePop();
|
|
24132
24278
|
callUserCallback(() => {
|
|
24133
|
-
((
|
|
24134
|
-
|
|
24279
|
+
((
|
|
24280
|
+
a1
|
|
24281
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24282
|
+
userdata
|
|
24135
24283
|
);
|
|
24136
24284
|
});
|
|
24137
24285
|
}
|
|
@@ -24188,8 +24336,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24188
24336
|
);
|
|
24189
24337
|
if (onload) {
|
|
24190
24338
|
var sp = stackSave();
|
|
24191
|
-
((
|
|
24192
|
-
|
|
24339
|
+
((
|
|
24340
|
+
a1,
|
|
24341
|
+
a2,
|
|
24342
|
+
a3
|
|
24343
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24344
|
+
handle,
|
|
24193
24345
|
userdata,
|
|
24194
24346
|
stringToUTF8OnStack(_file)
|
|
24195
24347
|
);
|
|
@@ -24197,8 +24349,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24197
24349
|
}
|
|
24198
24350
|
} else {
|
|
24199
24351
|
if (onerror)
|
|
24200
|
-
((
|
|
24201
|
-
|
|
24352
|
+
((
|
|
24353
|
+
a1,
|
|
24354
|
+
a2,
|
|
24355
|
+
a3
|
|
24356
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24357
|
+
handle,
|
|
24202
24358
|
userdata,
|
|
24203
24359
|
http.status
|
|
24204
24360
|
);
|
|
@@ -24211,8 +24367,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24211
24367
|
http.onerror = (e) => {
|
|
24212
24368
|
runtimeKeepalivePop();
|
|
24213
24369
|
if (onerror)
|
|
24214
|
-
((
|
|
24215
|
-
|
|
24370
|
+
((
|
|
24371
|
+
a1,
|
|
24372
|
+
a2,
|
|
24373
|
+
a3
|
|
24374
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24375
|
+
handle,
|
|
24216
24376
|
userdata,
|
|
24217
24377
|
http.status
|
|
24218
24378
|
);
|
|
@@ -24227,8 +24387,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24227
24387
|
) {
|
|
24228
24388
|
var percentComplete = (e.loaded / e.total) * 100;
|
|
24229
24389
|
if (onprogress)
|
|
24230
|
-
((
|
|
24231
|
-
|
|
24390
|
+
((
|
|
24391
|
+
a1,
|
|
24392
|
+
a2,
|
|
24393
|
+
a3
|
|
24394
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24395
|
+
handle,
|
|
24232
24396
|
userdata,
|
|
24233
24397
|
percentComplete
|
|
24234
24398
|
);
|
|
@@ -24285,8 +24449,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24285
24449
|
if (http.statusText) {
|
|
24286
24450
|
statusText = stringToUTF8OnStack(http.statusText);
|
|
24287
24451
|
}
|
|
24288
|
-
((
|
|
24289
|
-
|
|
24452
|
+
((
|
|
24453
|
+
a1,
|
|
24454
|
+
a2,
|
|
24455
|
+
a3,
|
|
24456
|
+
a4
|
|
24457
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24458
|
+
handle,
|
|
24290
24459
|
userdata,
|
|
24291
24460
|
http.status,
|
|
24292
24461
|
statusText
|
|
@@ -24307,8 +24476,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24307
24476
|
var buffer = _malloc(byteArray.length);
|
|
24308
24477
|
HEAPU8.set(byteArray, buffer);
|
|
24309
24478
|
if (onload)
|
|
24310
|
-
((
|
|
24311
|
-
|
|
24479
|
+
((
|
|
24480
|
+
a1,
|
|
24481
|
+
a2,
|
|
24482
|
+
a3,
|
|
24483
|
+
a4
|
|
24484
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24485
|
+
handle,
|
|
24312
24486
|
userdata,
|
|
24313
24487
|
buffer,
|
|
24314
24488
|
byteArray.length
|
|
@@ -24329,8 +24503,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24329
24503
|
// PROGRESS
|
|
24330
24504
|
http.onprogress = (e) => {
|
|
24331
24505
|
if (onprogress)
|
|
24332
|
-
((
|
|
24333
|
-
|
|
24506
|
+
((
|
|
24507
|
+
a1,
|
|
24508
|
+
a2,
|
|
24509
|
+
a3,
|
|
24510
|
+
a4
|
|
24511
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24512
|
+
handle,
|
|
24334
24513
|
userdata,
|
|
24335
24514
|
e.loaded,
|
|
24336
24515
|
e.lengthComputable || e.lengthComputable === undefined
|
|
@@ -24450,16 +24629,24 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24450
24629
|
if (event === 'error') {
|
|
24451
24630
|
withStackSave(() => {
|
|
24452
24631
|
var msg = stringToUTF8OnStack(data[2]);
|
|
24453
|
-
((
|
|
24454
|
-
|
|
24632
|
+
((
|
|
24633
|
+
a1,
|
|
24634
|
+
a2,
|
|
24635
|
+
a3,
|
|
24636
|
+
a4
|
|
24637
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24638
|
+
data[0],
|
|
24455
24639
|
data[1],
|
|
24456
24640
|
msg,
|
|
24457
24641
|
userData
|
|
24458
24642
|
);
|
|
24459
24643
|
});
|
|
24460
24644
|
} else {
|
|
24461
|
-
((
|
|
24462
|
-
|
|
24645
|
+
((
|
|
24646
|
+
a1,
|
|
24647
|
+
a2
|
|
24648
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24649
|
+
data,
|
|
24463
24650
|
userData
|
|
24464
24651
|
);
|
|
24465
24652
|
}
|
|
@@ -24925,8 +25112,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24925
25112
|
) => {
|
|
24926
25113
|
var webGlEventHandlerFunc = (e = event) => {
|
|
24927
25114
|
if (
|
|
24928
|
-
((
|
|
24929
|
-
|
|
25115
|
+
((
|
|
25116
|
+
a1,
|
|
25117
|
+
a2,
|
|
25118
|
+
a3
|
|
25119
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25120
|
+
eventTypeId,
|
|
24930
25121
|
0,
|
|
24931
25122
|
userData
|
|
24932
25123
|
)
|
|
@@ -25145,15 +25336,21 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25145
25336
|
) {
|
|
25146
25337
|
event.preventDefault();
|
|
25147
25338
|
GLUT.saveModifiers(event);
|
|
25148
|
-
((
|
|
25149
|
-
|
|
25339
|
+
((
|
|
25340
|
+
a1,
|
|
25341
|
+
a2
|
|
25342
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25343
|
+
lastX,
|
|
25150
25344
|
lastY
|
|
25151
25345
|
);
|
|
25152
25346
|
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
|
|
25153
25347
|
event.preventDefault();
|
|
25154
25348
|
GLUT.saveModifiers(event);
|
|
25155
|
-
((
|
|
25156
|
-
|
|
25349
|
+
((
|
|
25350
|
+
a1,
|
|
25351
|
+
a2
|
|
25352
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25353
|
+
lastX,
|
|
25157
25354
|
lastY
|
|
25158
25355
|
);
|
|
25159
25356
|
}
|
|
@@ -25314,8 +25511,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25314
25511
|
if (GLUT.specialFunc) {
|
|
25315
25512
|
event.preventDefault();
|
|
25316
25513
|
GLUT.saveModifiers(event);
|
|
25317
|
-
((
|
|
25318
|
-
|
|
25514
|
+
((
|
|
25515
|
+
a1,
|
|
25516
|
+
a2,
|
|
25517
|
+
a3
|
|
25518
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25519
|
+
key,
|
|
25319
25520
|
Browser.mouseX,
|
|
25320
25521
|
Browser.mouseY
|
|
25321
25522
|
);
|
|
@@ -25325,8 +25526,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25325
25526
|
if (key !== null && GLUT.keyboardFunc) {
|
|
25326
25527
|
event.preventDefault();
|
|
25327
25528
|
GLUT.saveModifiers(event);
|
|
25328
|
-
((
|
|
25329
|
-
|
|
25529
|
+
((
|
|
25530
|
+
a1,
|
|
25531
|
+
a2,
|
|
25532
|
+
a3
|
|
25533
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25534
|
+
key,
|
|
25330
25535
|
Browser.mouseX,
|
|
25331
25536
|
Browser.mouseY
|
|
25332
25537
|
);
|
|
@@ -25341,8 +25546,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25341
25546
|
if (GLUT.specialUpFunc) {
|
|
25342
25547
|
event.preventDefault();
|
|
25343
25548
|
GLUT.saveModifiers(event);
|
|
25344
|
-
((
|
|
25345
|
-
|
|
25549
|
+
((
|
|
25550
|
+
a1,
|
|
25551
|
+
a2,
|
|
25552
|
+
a3
|
|
25553
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25554
|
+
key,
|
|
25346
25555
|
Browser.mouseX,
|
|
25347
25556
|
Browser.mouseY
|
|
25348
25557
|
);
|
|
@@ -25352,8 +25561,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25352
25561
|
if (key !== null && GLUT.keyboardUpFunc) {
|
|
25353
25562
|
event.preventDefault();
|
|
25354
25563
|
GLUT.saveModifiers(event);
|
|
25355
|
-
((
|
|
25356
|
-
|
|
25564
|
+
((
|
|
25565
|
+
a1,
|
|
25566
|
+
a2,
|
|
25567
|
+
a3
|
|
25568
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25569
|
+
key,
|
|
25357
25570
|
Browser.mouseX,
|
|
25358
25571
|
Browser.mouseY
|
|
25359
25572
|
);
|
|
@@ -25417,10 +25630,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25417
25630
|
} catch (e) {}
|
|
25418
25631
|
event.preventDefault();
|
|
25419
25632
|
GLUT.saveModifiers(event);
|
|
25420
|
-
((
|
|
25421
|
-
|
|
25422
|
-
|
|
25423
|
-
|
|
25633
|
+
((
|
|
25634
|
+
a1,
|
|
25635
|
+
a2,
|
|
25636
|
+
a3,
|
|
25637
|
+
a4
|
|
25638
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25639
|
+
event['button'],
|
|
25424
25640
|
0 /*GLUT_DOWN*/,
|
|
25425
25641
|
Browser.mouseX,
|
|
25426
25642
|
Browser.mouseY
|
|
@@ -25435,10 +25651,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25435
25651
|
if (GLUT.mouseFunc) {
|
|
25436
25652
|
event.preventDefault();
|
|
25437
25653
|
GLUT.saveModifiers(event);
|
|
25438
|
-
((
|
|
25439
|
-
|
|
25440
|
-
|
|
25441
|
-
|
|
25654
|
+
((
|
|
25655
|
+
a1,
|
|
25656
|
+
a2,
|
|
25657
|
+
a3,
|
|
25658
|
+
a4
|
|
25659
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25660
|
+
event['button'],
|
|
25442
25661
|
1 /*GLUT_UP*/,
|
|
25443
25662
|
Browser.mouseX,
|
|
25444
25663
|
Browser.mouseY
|
|
@@ -25467,8 +25686,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25467
25686
|
if (GLUT.mouseFunc) {
|
|
25468
25687
|
event.preventDefault();
|
|
25469
25688
|
GLUT.saveModifiers(event);
|
|
25470
|
-
((
|
|
25471
|
-
|
|
25689
|
+
((
|
|
25690
|
+
a1,
|
|
25691
|
+
a2,
|
|
25692
|
+
a3,
|
|
25693
|
+
a4
|
|
25694
|
+
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25695
|
+
button,
|
|
25472
25696
|
0 /*GLUT_DOWN*/,
|
|
25473
25697
|
Browser.mouseX,
|
|
25474
25698
|
Browser.mouseY
|
|
@@ -25511,8 +25735,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25511
25735
|
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
|
|
25512
25736
|
if (GLUT.reshapeFunc) {
|
|
25513
25737
|
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
|
|
25514
|
-
((
|
|
25515
|
-
|
|
25738
|
+
((
|
|
25739
|
+
a1,
|
|
25740
|
+
a2
|
|
25741
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25742
|
+
width,
|
|
25516
25743
|
height
|
|
25517
25744
|
);
|
|
25518
25745
|
}
|
|
@@ -25555,8 +25782,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25555
25782
|
|
|
25556
25783
|
Browser.resizeListeners.push((width, height) => {
|
|
25557
25784
|
if (GLUT.reshapeFunc) {
|
|
25558
|
-
((
|
|
25559
|
-
|
|
25785
|
+
((
|
|
25786
|
+
a1,
|
|
25787
|
+
a2
|
|
25788
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25789
|
+
width,
|
|
25560
25790
|
height
|
|
25561
25791
|
);
|
|
25562
25792
|
}
|
|
@@ -25669,8 +25899,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25669
25899
|
var _glutTimerFunc = (msec, func, value) =>
|
|
25670
25900
|
safeSetTimeout(
|
|
25671
25901
|
() =>
|
|
25672
|
-
((
|
|
25673
|
-
|
|
25902
|
+
((
|
|
25903
|
+
a1
|
|
25904
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25905
|
+
value
|
|
25674
25906
|
),
|
|
25675
25907
|
msec
|
|
25676
25908
|
);
|
|
@@ -25830,8 +26062,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25830
26062
|
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
|
|
25831
26063
|
// Just call it once here.
|
|
25832
26064
|
if (GLUT.reshapeFunc) {
|
|
25833
|
-
((
|
|
25834
|
-
|
|
26065
|
+
((
|
|
26066
|
+
a1,
|
|
26067
|
+
a2
|
|
26068
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
26069
|
+
width,
|
|
25835
26070
|
height
|
|
25836
26071
|
);
|
|
25837
26072
|
}
|
|
@@ -26893,15 +27128,21 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26893
27128
|
callUserCallback(() => {
|
|
26894
27129
|
if (error) {
|
|
26895
27130
|
if (onerror)
|
|
26896
|
-
((
|
|
26897
|
-
|
|
27131
|
+
((
|
|
27132
|
+
a1
|
|
27133
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27134
|
+
arg
|
|
26898
27135
|
);
|
|
26899
27136
|
return;
|
|
26900
27137
|
}
|
|
26901
27138
|
var buffer = _malloc(byteArray.length);
|
|
26902
27139
|
HEAPU8.set(byteArray, buffer);
|
|
26903
|
-
((
|
|
26904
|
-
|
|
27140
|
+
((
|
|
27141
|
+
a1,
|
|
27142
|
+
a2,
|
|
27143
|
+
a3
|
|
27144
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27145
|
+
arg,
|
|
26905
27146
|
buffer,
|
|
26906
27147
|
byteArray.length
|
|
26907
27148
|
);
|
|
@@ -26933,14 +27174,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26933
27174
|
callUserCallback(() => {
|
|
26934
27175
|
if (error) {
|
|
26935
27176
|
if (onerror)
|
|
26936
|
-
((
|
|
26937
|
-
|
|
27177
|
+
((
|
|
27178
|
+
a1
|
|
27179
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27180
|
+
arg
|
|
26938
27181
|
);
|
|
26939
27182
|
return;
|
|
26940
27183
|
}
|
|
26941
27184
|
if (onstore)
|
|
26942
|
-
((
|
|
26943
|
-
|
|
27185
|
+
((
|
|
27186
|
+
a1
|
|
27187
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27188
|
+
arg
|
|
26944
27189
|
);
|
|
26945
27190
|
});
|
|
26946
27191
|
}
|
|
@@ -26955,14 +27200,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26955
27200
|
callUserCallback(() => {
|
|
26956
27201
|
if (error) {
|
|
26957
27202
|
if (onerror)
|
|
26958
|
-
((
|
|
26959
|
-
|
|
27203
|
+
((
|
|
27204
|
+
a1
|
|
27205
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27206
|
+
arg
|
|
26960
27207
|
);
|
|
26961
27208
|
return;
|
|
26962
27209
|
}
|
|
26963
27210
|
if (ondelete)
|
|
26964
|
-
((
|
|
26965
|
-
|
|
27211
|
+
((
|
|
27212
|
+
a1
|
|
27213
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27214
|
+
arg
|
|
26966
27215
|
);
|
|
26967
27216
|
});
|
|
26968
27217
|
});
|
|
@@ -26979,14 +27228,19 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26979
27228
|
callUserCallback(() => {
|
|
26980
27229
|
if (error) {
|
|
26981
27230
|
if (onerror)
|
|
26982
|
-
((
|
|
26983
|
-
|
|
27231
|
+
((
|
|
27232
|
+
a1
|
|
27233
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27234
|
+
arg
|
|
26984
27235
|
);
|
|
26985
27236
|
return;
|
|
26986
27237
|
}
|
|
26987
27238
|
if (oncheck)
|
|
26988
|
-
((
|
|
26989
|
-
|
|
27239
|
+
((
|
|
27240
|
+
a1,
|
|
27241
|
+
a2
|
|
27242
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27243
|
+
arg,
|
|
26990
27244
|
exists
|
|
26991
27245
|
);
|
|
26992
27246
|
});
|
|
@@ -27002,14 +27256,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27002
27256
|
callUserCallback(() => {
|
|
27003
27257
|
if (error) {
|
|
27004
27258
|
if (onerror)
|
|
27005
|
-
((
|
|
27006
|
-
|
|
27259
|
+
((
|
|
27260
|
+
a1
|
|
27261
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27262
|
+
arg
|
|
27007
27263
|
);
|
|
27008
27264
|
return;
|
|
27009
27265
|
}
|
|
27010
27266
|
if (onclear)
|
|
27011
|
-
((
|
|
27012
|
-
|
|
27267
|
+
((
|
|
27268
|
+
a1
|
|
27269
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27270
|
+
arg
|
|
27013
27271
|
);
|
|
27014
27272
|
});
|
|
27015
27273
|
});
|
|
@@ -27166,8 +27424,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27166
27424
|
safeSetTimeout(() => {
|
|
27167
27425
|
var stackBegin = Asyncify.currData + 12;
|
|
27168
27426
|
var stackEnd = HEAPU32[Asyncify.currData >> 2];
|
|
27169
|
-
((
|
|
27170
|
-
|
|
27427
|
+
((
|
|
27428
|
+
a1,
|
|
27429
|
+
a2
|
|
27430
|
+
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27431
|
+
stackBegin,
|
|
27171
27432
|
stackEnd
|
|
27172
27433
|
);
|
|
27173
27434
|
wakeUp();
|
|
@@ -27228,8 +27489,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27228
27489
|
HEAPU32[(newFiber + 12) >> 2] = 0;
|
|
27229
27490
|
|
|
27230
27491
|
var userData = HEAPU32[(newFiber + 16) >> 2];
|
|
27231
|
-
((
|
|
27232
|
-
|
|
27492
|
+
((
|
|
27493
|
+
a1
|
|
27494
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27495
|
+
userData
|
|
27233
27496
|
);
|
|
27234
27497
|
} else {
|
|
27235
27498
|
var asyncifyData = newFiber + 20;
|
|
@@ -28241,8 +28504,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
28241
28504
|
if (!SDL.eventHandler) return;
|
|
28242
28505
|
|
|
28243
28506
|
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
|
|
28244
|
-
((
|
|
28245
|
-
|
|
28507
|
+
((
|
|
28508
|
+
a1,
|
|
28509
|
+
a2
|
|
28510
|
+
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
28511
|
+
SDL.eventHandlerContext,
|
|
28246
28512
|
SDL.eventHandlerTemp
|
|
28247
28513
|
);
|
|
28248
28514
|
}
|
|
@@ -29875,9 +30141,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
29875
30141
|
return;
|
|
29876
30142
|
|
|
29877
30143
|
// Ask SDL audio data from the user code.
|
|
29878
|
-
((
|
|
29879
|
-
|
|
29880
|
-
|
|
30144
|
+
((
|
|
30145
|
+
a1,
|
|
30146
|
+
a2,
|
|
30147
|
+
a3
|
|
30148
|
+
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30149
|
+
SDL.audio.userdata,
|
|
29881
30150
|
SDL.audio.buffer,
|
|
29882
30151
|
SDL.audio.bufferSize
|
|
29883
30152
|
);
|
|
@@ -30335,8 +30604,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
30335
30604
|
info.audio = null;
|
|
30336
30605
|
}
|
|
30337
30606
|
if (SDL.channelFinished) {
|
|
30338
|
-
((
|
|
30339
|
-
|
|
30607
|
+
((
|
|
30608
|
+
a1
|
|
30609
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30610
|
+
channel
|
|
30340
30611
|
);
|
|
30341
30612
|
}
|
|
30342
30613
|
}
|
|
@@ -30405,8 +30676,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
30405
30676
|
channelInfo.audio = null;
|
|
30406
30677
|
}
|
|
30407
30678
|
if (SDL.channelFinished)
|
|
30408
|
-
((
|
|
30409
|
-
|
|
30679
|
+
((
|
|
30680
|
+
a1
|
|
30681
|
+
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30682
|
+
channel
|
|
30410
30683
|
);
|
|
30411
30684
|
};
|
|
30412
30685
|
if (channelInfo.audio) {
|
|
@@ -31154,8 +31427,11 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31154
31427
|
var _SDL_AddTimer = (interval, callback, param) =>
|
|
31155
31428
|
safeSetTimeout(
|
|
31156
31429
|
() =>
|
|
31157
|
-
((
|
|
31158
|
-
|
|
31430
|
+
((
|
|
31431
|
+
a1,
|
|
31432
|
+
a2
|
|
31433
|
+
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31434
|
+
interval,
|
|
31159
31435
|
param
|
|
31160
31436
|
),
|
|
31161
31437
|
interval
|
|
@@ -31526,8 +31802,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31526
31802
|
|
|
31527
31803
|
socket.onopen = function (e) {
|
|
31528
31804
|
var eventPtr = WS.getSocketEvent(socketId);
|
|
31529
|
-
((
|
|
31530
|
-
|
|
31805
|
+
((
|
|
31806
|
+
a1,
|
|
31807
|
+
a2,
|
|
31808
|
+
a3
|
|
31809
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31810
|
+
0 /*TODO*/,
|
|
31531
31811
|
eventPtr,
|
|
31532
31812
|
userData
|
|
31533
31813
|
);
|
|
@@ -31549,8 +31829,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31549
31829
|
|
|
31550
31830
|
socket.onerror = function (e) {
|
|
31551
31831
|
var eventPtr = WS.getSocketEvent(socketId);
|
|
31552
|
-
((
|
|
31553
|
-
|
|
31832
|
+
((
|
|
31833
|
+
a1,
|
|
31834
|
+
a2,
|
|
31835
|
+
a3
|
|
31836
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31837
|
+
0 /*TODO*/,
|
|
31554
31838
|
eventPtr,
|
|
31555
31839
|
userData
|
|
31556
31840
|
);
|
|
@@ -31575,8 +31859,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31575
31859
|
(HEAP8[eventPtr + 4] = e.wasClean),
|
|
31576
31860
|
(HEAP16[(eventPtr + 6) >> 1] = e.code),
|
|
31577
31861
|
stringToUTF8(e.reason, eventPtr + 8, 512);
|
|
31578
|
-
((
|
|
31579
|
-
|
|
31862
|
+
((
|
|
31863
|
+
a1,
|
|
31864
|
+
a2,
|
|
31865
|
+
a3
|
|
31866
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31867
|
+
0 /*TODO*/,
|
|
31580
31868
|
eventPtr,
|
|
31581
31869
|
userData
|
|
31582
31870
|
);
|
|
@@ -31610,8 +31898,12 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31610
31898
|
(HEAPU32[(eventPtr + 4) >> 2] = buf),
|
|
31611
31899
|
(HEAP32[(eventPtr + 8) >> 2] = len),
|
|
31612
31900
|
(HEAP8[eventPtr + 12] = isText),
|
|
31613
|
-
((
|
|
31614
|
-
|
|
31901
|
+
((
|
|
31902
|
+
a1,
|
|
31903
|
+
a2,
|
|
31904
|
+
a3
|
|
31905
|
+
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31906
|
+
0 /*TODO*/,
|
|
31615
31907
|
eventPtr,
|
|
31616
31908
|
userData
|
|
31617
31909
|
);
|
|
@@ -31808,13 +32100,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31808
32100
|
// End JS library code
|
|
31809
32101
|
|
|
31810
32102
|
var ASM_CONSTS = {
|
|
31811
|
-
|
|
32103
|
+
16327421: ($0) => {
|
|
31812
32104
|
if (!$0) {
|
|
31813
32105
|
AL.alcErr = 0xa004;
|
|
31814
32106
|
return 1;
|
|
31815
32107
|
}
|
|
31816
32108
|
},
|
|
31817
|
-
|
|
32109
|
+
16327469: ($0) => {
|
|
31818
32110
|
if (!AL.currentCtx) {
|
|
31819
32111
|
err('alGetProcAddress() called without a valid context');
|
|
31820
32112
|
return 1;
|
|
@@ -35378,19 +35670,16 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
35378
35670
|
// We override NODEFS.createNode() to add an `isSharedFS` flag to all NODEFS
|
|
35379
35671
|
// nodes. This way we can tell whether file-locking is needed and possible
|
|
35380
35672
|
// for an FS node, even if wrapped with PROXYFS.
|
|
35381
|
-
const
|
|
35673
|
+
const originalNodeFsCreateNode = NODEFS.createNode;
|
|
35382
35674
|
NODEFS.createNode = function createNodeWithSharedFlag() {
|
|
35383
|
-
const node =
|
|
35675
|
+
const node = originalNodeFsCreateNode.apply(NODEFS, arguments);
|
|
35384
35676
|
node.isSharedFS = true;
|
|
35385
35677
|
return node;
|
|
35386
35678
|
};
|
|
35387
35679
|
|
|
35388
35680
|
var originalHashAddNode = FS.hashAddNode;
|
|
35389
35681
|
FS.hashAddNode = function hashAddNodeIfNotSharedFS(node) {
|
|
35390
|
-
if (
|
|
35391
|
-
typeof locking === 'object' &&
|
|
35392
|
-
locking?.is_shared_fs_node(node)
|
|
35393
|
-
) {
|
|
35682
|
+
if (node?.isSharedFS) {
|
|
35394
35683
|
// Avoid caching shared VFS nodes so multiple instances
|
|
35395
35684
|
// can access the same underlying filesystem without
|
|
35396
35685
|
// conflicting caches.
|