@php-wasm/node 3.0.19 → 3.0.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/asyncify/7_2_34/php_7_2.wasm +0 -0
- package/asyncify/7_3_33/php_7_3.wasm +0 -0
- package/asyncify/7_4_33/php_7_4.wasm +0 -0
- package/asyncify/8_0_30/php_8_0.wasm +0 -0
- package/asyncify/8_1_33/php_8_1.wasm +0 -0
- package/asyncify/8_2_29/php_8_2.wasm +0 -0
- package/asyncify/8_3_27/php_8_3.wasm +0 -0
- package/asyncify/8_4_14/php_8_4.wasm +0 -0
- package/asyncify/php_7_2.js +477 -582
- package/asyncify/php_7_3.js +477 -582
- package/asyncify/php_7_4.js +464 -582
- package/asyncify/php_8_0.js +464 -582
- package/asyncify/php_8_1.js +427 -582
- package/asyncify/php_8_2.js +427 -582
- package/asyncify/php_8_3.js +427 -582
- package/asyncify/php_8_4.js +427 -582
- package/index.cjs +2574 -792
- package/index.js +2574 -792
- package/jspi/7_2_34/php_7_2.wasm +0 -0
- package/jspi/7_3_33/php_7_3.wasm +0 -0
- package/jspi/7_4_33/php_7_4.wasm +0 -0
- package/jspi/8_0_30/php_8_0.wasm +0 -0
- package/jspi/8_1_33/php_8_1.wasm +0 -0
- package/jspi/8_2_29/php_8_2.wasm +0 -0
- package/jspi/8_3_27/php_8_3.wasm +0 -0
- package/jspi/8_4_14/php_8_4.wasm +0 -0
- package/jspi/php_7_2.js +8 -8
- package/jspi/php_7_3.js +8 -8
- package/jspi/php_7_4.js +8 -8
- package/jspi/php_8_0.js +8 -8
- package/jspi/php_8_1.js +8 -8
- package/jspi/php_8_2.js +8 -8
- package/jspi/php_8_3.js +8 -8
- package/jspi/php_8_4.js +8 -8
- package/package.json +7 -7
package/asyncify/php_7_3.js
CHANGED
|
@@ -8,7 +8,7 @@ import path from 'path';
|
|
|
8
8
|
|
|
9
9
|
const dependencyFilename = path.join(__dirname, '7_3_33', 'php_7_3.wasm');
|
|
10
10
|
export { dependencyFilename };
|
|
11
|
-
export const dependenciesTotalSize =
|
|
11
|
+
export const dependenciesTotalSize = 28158983;
|
|
12
12
|
const phpVersionString = '7.3.33';
|
|
13
13
|
export function init(RuntimeName, PHPLoader) {
|
|
14
14
|
// The rest of the code comes from the built php.js file and esm-suffix.js
|
|
@@ -831,7 +831,7 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
831
831
|
},
|
|
832
832
|
};
|
|
833
833
|
|
|
834
|
-
var ___heap_base =
|
|
834
|
+
var ___heap_base = 12187392;
|
|
835
835
|
|
|
836
836
|
var alignMemory = (size, alignment) => {
|
|
837
837
|
return Math.ceil(size / alignment) * alignment;
|
|
@@ -995,7 +995,7 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
995
995
|
|
|
996
996
|
/** @type {WebAssembly.Table} */
|
|
997
997
|
var wasmTable = new WebAssembly.Table({
|
|
998
|
-
initial:
|
|
998
|
+
initial: 12899,
|
|
999
999
|
element: 'anyfunc',
|
|
1000
1000
|
});
|
|
1001
1001
|
var getWasmTableEntry = (funcPtr) => {
|
|
@@ -1774,25 +1774,129 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
1774
1774
|
);
|
|
1775
1775
|
|
|
1776
1776
|
var ___call_sighandler = (fp, sig) =>
|
|
1777
|
-
((
|
|
1778
|
-
|
|
1779
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
1780
|
-
sig
|
|
1777
|
+
((a1) => {})(
|
|
1778
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ sig
|
|
1781
1779
|
);
|
|
1782
1780
|
___call_sighandler.sig = 'vpi';
|
|
1783
1781
|
|
|
1782
|
+
var exceptionLast = 0;
|
|
1783
|
+
|
|
1784
|
+
class ExceptionInfo {
|
|
1785
|
+
// excPtr - Thrown object pointer to wrap. Metadata pointer is calculated from it.
|
|
1786
|
+
constructor(excPtr) {
|
|
1787
|
+
this.excPtr = excPtr;
|
|
1788
|
+
this.ptr = excPtr - 24;
|
|
1789
|
+
}
|
|
1790
|
+
|
|
1791
|
+
set_type(type) {
|
|
1792
|
+
HEAPU32[(this.ptr + 4) >> 2] = type;
|
|
1793
|
+
}
|
|
1794
|
+
|
|
1795
|
+
get_type() {
|
|
1796
|
+
return HEAPU32[(this.ptr + 4) >> 2];
|
|
1797
|
+
}
|
|
1798
|
+
|
|
1799
|
+
set_destructor(destructor) {
|
|
1800
|
+
HEAPU32[(this.ptr + 8) >> 2] = destructor;
|
|
1801
|
+
}
|
|
1802
|
+
|
|
1803
|
+
get_destructor() {
|
|
1804
|
+
return HEAPU32[(this.ptr + 8) >> 2];
|
|
1805
|
+
}
|
|
1806
|
+
|
|
1807
|
+
set_caught(caught) {
|
|
1808
|
+
caught = caught ? 1 : 0;
|
|
1809
|
+
HEAP8[this.ptr + 12] = caught;
|
|
1810
|
+
}
|
|
1811
|
+
|
|
1812
|
+
get_caught() {
|
|
1813
|
+
return HEAP8[this.ptr + 12] != 0;
|
|
1814
|
+
}
|
|
1815
|
+
|
|
1816
|
+
set_rethrown(rethrown) {
|
|
1817
|
+
rethrown = rethrown ? 1 : 0;
|
|
1818
|
+
HEAP8[this.ptr + 13] = rethrown;
|
|
1819
|
+
}
|
|
1820
|
+
|
|
1821
|
+
get_rethrown() {
|
|
1822
|
+
return HEAP8[this.ptr + 13] != 0;
|
|
1823
|
+
}
|
|
1824
|
+
|
|
1825
|
+
// Initialize native structure fields. Should be called once after allocated.
|
|
1826
|
+
init(type, destructor) {
|
|
1827
|
+
this.set_adjusted_ptr(0);
|
|
1828
|
+
this.set_type(type);
|
|
1829
|
+
this.set_destructor(destructor);
|
|
1830
|
+
}
|
|
1831
|
+
|
|
1832
|
+
set_adjusted_ptr(adjustedPtr) {
|
|
1833
|
+
HEAPU32[(this.ptr + 16) >> 2] = adjustedPtr;
|
|
1834
|
+
}
|
|
1835
|
+
|
|
1836
|
+
get_adjusted_ptr() {
|
|
1837
|
+
return HEAPU32[(this.ptr + 16) >> 2];
|
|
1838
|
+
}
|
|
1839
|
+
}
|
|
1840
|
+
|
|
1841
|
+
var ___resumeException = (ptr) => {
|
|
1842
|
+
if (!exceptionLast) {
|
|
1843
|
+
exceptionLast = ptr;
|
|
1844
|
+
}
|
|
1845
|
+
throw exceptionLast;
|
|
1846
|
+
};
|
|
1847
|
+
___resumeException.sig = 'vp';
|
|
1848
|
+
|
|
1849
|
+
var setTempRet0 = (val) => __emscripten_tempret_set(val);
|
|
1850
|
+
var findMatchingCatch = (args) => {
|
|
1851
|
+
var thrown = exceptionLast;
|
|
1852
|
+
if (!thrown) {
|
|
1853
|
+
// just pass through the null ptr
|
|
1854
|
+
setTempRet0(0);
|
|
1855
|
+
return 0;
|
|
1856
|
+
}
|
|
1857
|
+
var info = new ExceptionInfo(thrown);
|
|
1858
|
+
info.set_adjusted_ptr(thrown);
|
|
1859
|
+
var thrownType = info.get_type();
|
|
1860
|
+
if (!thrownType) {
|
|
1861
|
+
// just pass through the thrown ptr
|
|
1862
|
+
setTempRet0(0);
|
|
1863
|
+
return thrown;
|
|
1864
|
+
}
|
|
1865
|
+
|
|
1866
|
+
// can_catch receives a **, add indirection
|
|
1867
|
+
// The different catch blocks are denoted by different types.
|
|
1868
|
+
// Due to inheritance, those types may not precisely match the
|
|
1869
|
+
// type of the thrown object. Find one which matches, and
|
|
1870
|
+
// return the type of the catch block which should be called.
|
|
1871
|
+
for (var caughtType of args) {
|
|
1872
|
+
if (caughtType === 0 || caughtType === thrownType) {
|
|
1873
|
+
// Catch all clause matched or exactly the same type is caught
|
|
1874
|
+
break;
|
|
1875
|
+
}
|
|
1876
|
+
var adjusted_ptr_addr = info.ptr + 16;
|
|
1877
|
+
if (___cxa_can_catch(caughtType, thrownType, adjusted_ptr_addr)) {
|
|
1878
|
+
setTempRet0(caughtType);
|
|
1879
|
+
return thrown;
|
|
1880
|
+
}
|
|
1881
|
+
}
|
|
1882
|
+
setTempRet0(thrownType);
|
|
1883
|
+
return thrown;
|
|
1884
|
+
};
|
|
1885
|
+
var ___cxa_find_matching_catch_2 = () => findMatchingCatch([]);
|
|
1886
|
+
___cxa_find_matching_catch_2.sig = 'p';
|
|
1887
|
+
|
|
1784
1888
|
var ___memory_base = new WebAssembly.Global(
|
|
1785
1889
|
{ value: 'i32', mutable: false },
|
|
1786
1890
|
1024
|
|
1787
1891
|
);
|
|
1788
1892
|
|
|
1789
|
-
var ___stack_high =
|
|
1893
|
+
var ___stack_high = 12187392;
|
|
1790
1894
|
|
|
1791
|
-
var ___stack_low =
|
|
1895
|
+
var ___stack_low = 11138816;
|
|
1792
1896
|
|
|
1793
1897
|
var ___stack_pointer = new WebAssembly.Global(
|
|
1794
1898
|
{ value: 'i32', mutable: true },
|
|
1795
|
-
|
|
1899
|
+
12187392
|
|
1796
1900
|
);
|
|
1797
1901
|
|
|
1798
1902
|
var PATH = {
|
|
@@ -8770,11 +8874,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
8770
8874
|
dlSetError(`'Could not load dynamic lib: ${filename}\n${e}`);
|
|
8771
8875
|
runtimeKeepalivePop();
|
|
8772
8876
|
callUserCallback(() =>
|
|
8773
|
-
((
|
|
8774
|
-
|
|
8775
|
-
a2
|
|
8776
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
8777
|
-
handle,
|
|
8877
|
+
((a1, a2) => {})(
|
|
8878
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
|
|
8778
8879
|
user_data
|
|
8779
8880
|
)
|
|
8780
8881
|
);
|
|
@@ -8782,11 +8883,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
8782
8883
|
function successCallback() {
|
|
8783
8884
|
runtimeKeepalivePop();
|
|
8784
8885
|
callUserCallback(() =>
|
|
8785
|
-
((
|
|
8786
|
-
|
|
8787
|
-
a2
|
|
8788
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
8789
|
-
handle,
|
|
8886
|
+
((a1, a2) => {})(
|
|
8887
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
|
|
8790
8888
|
user_data
|
|
8791
8889
|
)
|
|
8792
8890
|
);
|
|
@@ -18677,8 +18775,6 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
18677
18775
|
|
|
18678
18776
|
var getTempRet0 = (val) => __emscripten_tempret_get();
|
|
18679
18777
|
|
|
18680
|
-
var setTempRet0 = (val) => __emscripten_tempret_set(val);
|
|
18681
|
-
|
|
18682
18778
|
var _stackAlloc = stackAlloc;
|
|
18683
18779
|
|
|
18684
18780
|
var _stackSave = stackSave;
|
|
@@ -19450,11 +19546,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
19450
19546
|
var trace = getCallstack();
|
|
19451
19547
|
var parts = trace.split('\n');
|
|
19452
19548
|
for (var i = 0; i < parts.length; i++) {
|
|
19453
|
-
var ret = ((
|
|
19454
|
-
|
|
19455
|
-
a2
|
|
19456
|
-
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
19457
|
-
0,
|
|
19549
|
+
var ret = ((a1, a2) => {})(
|
|
19550
|
+
/* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0,
|
|
19458
19551
|
arg
|
|
19459
19552
|
);
|
|
19460
19553
|
if (ret !== 0) return;
|
|
@@ -19468,65 +19561,6 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
19468
19561
|
var __Unwind_FindEnclosingFunction = (ip) => 0;
|
|
19469
19562
|
__Unwind_FindEnclosingFunction.sig = 'pp';
|
|
19470
19563
|
|
|
19471
|
-
class ExceptionInfo {
|
|
19472
|
-
// excPtr - Thrown object pointer to wrap. Metadata pointer is calculated from it.
|
|
19473
|
-
constructor(excPtr) {
|
|
19474
|
-
this.excPtr = excPtr;
|
|
19475
|
-
this.ptr = excPtr - 24;
|
|
19476
|
-
}
|
|
19477
|
-
|
|
19478
|
-
set_type(type) {
|
|
19479
|
-
HEAPU32[(this.ptr + 4) >> 2] = type;
|
|
19480
|
-
}
|
|
19481
|
-
|
|
19482
|
-
get_type() {
|
|
19483
|
-
return HEAPU32[(this.ptr + 4) >> 2];
|
|
19484
|
-
}
|
|
19485
|
-
|
|
19486
|
-
set_destructor(destructor) {
|
|
19487
|
-
HEAPU32[(this.ptr + 8) >> 2] = destructor;
|
|
19488
|
-
}
|
|
19489
|
-
|
|
19490
|
-
get_destructor() {
|
|
19491
|
-
return HEAPU32[(this.ptr + 8) >> 2];
|
|
19492
|
-
}
|
|
19493
|
-
|
|
19494
|
-
set_caught(caught) {
|
|
19495
|
-
caught = caught ? 1 : 0;
|
|
19496
|
-
HEAP8[this.ptr + 12] = caught;
|
|
19497
|
-
}
|
|
19498
|
-
|
|
19499
|
-
get_caught() {
|
|
19500
|
-
return HEAP8[this.ptr + 12] != 0;
|
|
19501
|
-
}
|
|
19502
|
-
|
|
19503
|
-
set_rethrown(rethrown) {
|
|
19504
|
-
rethrown = rethrown ? 1 : 0;
|
|
19505
|
-
HEAP8[this.ptr + 13] = rethrown;
|
|
19506
|
-
}
|
|
19507
|
-
|
|
19508
|
-
get_rethrown() {
|
|
19509
|
-
return HEAP8[this.ptr + 13] != 0;
|
|
19510
|
-
}
|
|
19511
|
-
|
|
19512
|
-
// Initialize native structure fields. Should be called once after allocated.
|
|
19513
|
-
init(type, destructor) {
|
|
19514
|
-
this.set_adjusted_ptr(0);
|
|
19515
|
-
this.set_type(type);
|
|
19516
|
-
this.set_destructor(destructor);
|
|
19517
|
-
}
|
|
19518
|
-
|
|
19519
|
-
set_adjusted_ptr(adjustedPtr) {
|
|
19520
|
-
HEAPU32[(this.ptr + 16) >> 2] = adjustedPtr;
|
|
19521
|
-
}
|
|
19522
|
-
|
|
19523
|
-
get_adjusted_ptr() {
|
|
19524
|
-
return HEAPU32[(this.ptr + 16) >> 2];
|
|
19525
|
-
}
|
|
19526
|
-
}
|
|
19527
|
-
|
|
19528
|
-
var exceptionLast = 0;
|
|
19529
|
-
|
|
19530
19564
|
var uncaughtExceptionCount = 0;
|
|
19531
19565
|
var ___cxa_throw = (ptr, type, destructor) => {
|
|
19532
19566
|
var info = new ExceptionInfo(ptr);
|
|
@@ -20099,12 +20133,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20099
20133
|
stringToUTF8(e.locale || '', keyEventData + 128, 32);
|
|
20100
20134
|
|
|
20101
20135
|
if (
|
|
20102
|
-
((
|
|
20103
|
-
|
|
20104
|
-
a2,
|
|
20105
|
-
a3
|
|
20106
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20107
|
-
eventTypeId,
|
|
20136
|
+
((a1, a2, a3) => {})(
|
|
20137
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
20108
20138
|
keyEventData,
|
|
20109
20139
|
userData
|
|
20110
20140
|
)
|
|
@@ -20222,12 +20252,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20222
20252
|
fillMouseEventData(JSEvents.mouseEvent, e, target);
|
|
20223
20253
|
|
|
20224
20254
|
if (
|
|
20225
|
-
((
|
|
20226
|
-
|
|
20227
|
-
a2,
|
|
20228
|
-
a3
|
|
20229
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20230
|
-
eventTypeId,
|
|
20255
|
+
((a1, a2, a3) => {})(
|
|
20256
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
20231
20257
|
JSEvents.mouseEvent,
|
|
20232
20258
|
userData
|
|
20233
20259
|
)
|
|
@@ -20441,12 +20467,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20441
20467
|
HEAPF64[(wheelEvent + 80) >> 3] = e['deltaZ'];
|
|
20442
20468
|
HEAP32[(wheelEvent + 88) >> 2] = e['deltaMode'];
|
|
20443
20469
|
if (
|
|
20444
|
-
((
|
|
20445
|
-
|
|
20446
|
-
a2,
|
|
20447
|
-
a3
|
|
20448
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20449
|
-
eventTypeId,
|
|
20470
|
+
((a1, a2, a3) => {})(
|
|
20471
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
20450
20472
|
wheelEvent,
|
|
20451
20473
|
userData
|
|
20452
20474
|
)
|
|
@@ -20527,12 +20549,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20527
20549
|
HEAP32[(uiEvent + 28) >> 2] = pageXOffset | 0; // scroll offsets are float
|
|
20528
20550
|
HEAP32[(uiEvent + 32) >> 2] = pageYOffset | 0;
|
|
20529
20551
|
if (
|
|
20530
|
-
((
|
|
20531
|
-
|
|
20532
|
-
a2,
|
|
20533
|
-
a3
|
|
20534
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20535
|
-
eventTypeId,
|
|
20552
|
+
((a1, a2, a3) => {})(
|
|
20553
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
20536
20554
|
uiEvent,
|
|
20537
20555
|
userData
|
|
20538
20556
|
)
|
|
@@ -20606,12 +20624,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20606
20624
|
stringToUTF8(id, focusEvent + 128, 128);
|
|
20607
20625
|
|
|
20608
20626
|
if (
|
|
20609
|
-
((
|
|
20610
|
-
|
|
20611
|
-
a2,
|
|
20612
|
-
a3
|
|
20613
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20614
|
-
eventTypeId,
|
|
20627
|
+
((a1, a2, a3) => {})(
|
|
20628
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
20615
20629
|
focusEvent,
|
|
20616
20630
|
userData
|
|
20617
20631
|
)
|
|
@@ -20727,12 +20741,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20727
20741
|
); // TODO: Thread-safety with respect to emscripten_get_deviceorientation_status()
|
|
20728
20742
|
|
|
20729
20743
|
if (
|
|
20730
|
-
((
|
|
20731
|
-
|
|
20732
|
-
a2,
|
|
20733
|
-
a3
|
|
20734
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20735
|
-
eventTypeId,
|
|
20744
|
+
((a1, a2, a3) => {})(
|
|
20745
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
20736
20746
|
JSEvents.deviceOrientationEvent,
|
|
20737
20747
|
userData
|
|
20738
20748
|
)
|
|
@@ -20815,12 +20825,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20815
20825
|
fillDeviceMotionEventData(JSEvents.deviceMotionEvent, e, target); // TODO: Thread-safety with respect to emscripten_get_devicemotion_status()
|
|
20816
20826
|
|
|
20817
20827
|
if (
|
|
20818
|
-
((
|
|
20819
|
-
|
|
20820
|
-
a2,
|
|
20821
|
-
a3
|
|
20822
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20823
|
-
eventTypeId,
|
|
20828
|
+
((a1, a2, a3) => {})(
|
|
20829
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
20824
20830
|
JSEvents.deviceMotionEvent,
|
|
20825
20831
|
userData
|
|
20826
20832
|
)
|
|
@@ -20930,12 +20936,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
20930
20936
|
fillOrientationChangeEventData(orientationChangeEvent);
|
|
20931
20937
|
|
|
20932
20938
|
if (
|
|
20933
|
-
((
|
|
20934
|
-
|
|
20935
|
-
a2,
|
|
20936
|
-
a3
|
|
20937
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
20938
|
-
eventTypeId,
|
|
20939
|
+
((a1, a2, a3) => {})(
|
|
20940
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
20939
20941
|
orientationChangeEvent,
|
|
20940
20942
|
userData
|
|
20941
20943
|
)
|
|
@@ -21068,12 +21070,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21068
21070
|
fillFullscreenChangeEventData(fullscreenChangeEvent);
|
|
21069
21071
|
|
|
21070
21072
|
if (
|
|
21071
|
-
((
|
|
21072
|
-
|
|
21073
|
-
a2,
|
|
21074
|
-
a3
|
|
21075
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21076
|
-
eventTypeId,
|
|
21073
|
+
((a1, a2, a3) => {})(
|
|
21074
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
21077
21075
|
fullscreenChangeEvent,
|
|
21078
21076
|
userData
|
|
21079
21077
|
)
|
|
@@ -21237,12 +21235,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21237
21235
|
);
|
|
21238
21236
|
|
|
21239
21237
|
if (currentFullscreenStrategy.canvasResizedCallback) {
|
|
21240
|
-
((
|
|
21241
|
-
|
|
21242
|
-
a2,
|
|
21243
|
-
a3
|
|
21244
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21245
|
-
37,
|
|
21238
|
+
((a1, a2, a3) => {})(
|
|
21239
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
|
|
21246
21240
|
0,
|
|
21247
21241
|
currentFullscreenStrategy.canvasResizedCallbackUserData
|
|
21248
21242
|
);
|
|
@@ -21348,12 +21342,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21348
21342
|
currentFullscreenStrategy = strategy;
|
|
21349
21343
|
|
|
21350
21344
|
if (strategy.canvasResizedCallback) {
|
|
21351
|
-
((
|
|
21352
|
-
|
|
21353
|
-
a2,
|
|
21354
|
-
a3
|
|
21355
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21356
|
-
37,
|
|
21345
|
+
((a1, a2, a3) => {})(
|
|
21346
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
|
|
21357
21347
|
0,
|
|
21358
21348
|
strategy.canvasResizedCallbackUserData
|
|
21359
21349
|
);
|
|
@@ -21455,12 +21445,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21455
21445
|
!inCenteredWithoutScalingFullscreenMode &&
|
|
21456
21446
|
currentFullscreenStrategy.canvasResizedCallback
|
|
21457
21447
|
) {
|
|
21458
|
-
((
|
|
21459
|
-
|
|
21460
|
-
a2,
|
|
21461
|
-
a3
|
|
21462
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21463
|
-
37,
|
|
21448
|
+
((a1, a2, a3) => {})(
|
|
21449
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
|
|
21464
21450
|
0,
|
|
21465
21451
|
currentFullscreenStrategy.canvasResizedCallbackUserData
|
|
21466
21452
|
);
|
|
@@ -21559,12 +21545,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21559
21545
|
softFullscreenResizeWebGLRenderTarget
|
|
21560
21546
|
);
|
|
21561
21547
|
if (strategy.canvasResizedCallback) {
|
|
21562
|
-
((
|
|
21563
|
-
|
|
21564
|
-
a2,
|
|
21565
|
-
a3
|
|
21566
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21567
|
-
37,
|
|
21548
|
+
((a1, a2, a3) => {})(
|
|
21549
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
|
|
21568
21550
|
0,
|
|
21569
21551
|
strategy.canvasResizedCallbackUserData
|
|
21570
21552
|
);
|
|
@@ -21577,12 +21559,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21577
21559
|
|
|
21578
21560
|
// Inform the caller that the canvas size has changed.
|
|
21579
21561
|
if (strategy.canvasResizedCallback) {
|
|
21580
|
-
((
|
|
21581
|
-
|
|
21582
|
-
a2,
|
|
21583
|
-
a3
|
|
21584
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21585
|
-
37,
|
|
21562
|
+
((a1, a2, a3) => {})(
|
|
21563
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 37,
|
|
21586
21564
|
0,
|
|
21587
21565
|
strategy.canvasResizedCallbackUserData
|
|
21588
21566
|
);
|
|
@@ -21650,12 +21628,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21650
21628
|
fillPointerlockChangeEventData(pointerlockChangeEvent);
|
|
21651
21629
|
|
|
21652
21630
|
if (
|
|
21653
|
-
((
|
|
21654
|
-
|
|
21655
|
-
a2,
|
|
21656
|
-
a3
|
|
21657
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21658
|
-
eventTypeId,
|
|
21631
|
+
((a1, a2, a3) => {})(
|
|
21632
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
21659
21633
|
pointerlockChangeEvent,
|
|
21660
21634
|
userData
|
|
21661
21635
|
)
|
|
@@ -21745,12 +21719,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21745
21719
|
) => {
|
|
21746
21720
|
var pointerlockErrorEventHandlerFunc = (e = event) => {
|
|
21747
21721
|
if (
|
|
21748
|
-
((
|
|
21749
|
-
|
|
21750
|
-
a2,
|
|
21751
|
-
a3
|
|
21752
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21753
|
-
eventTypeId,
|
|
21722
|
+
((a1, a2, a3) => {})(
|
|
21723
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
21754
21724
|
0,
|
|
21755
21725
|
userData
|
|
21756
21726
|
)
|
|
@@ -21950,12 +21920,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
21950
21920
|
fillVisibilityChangeEventData(visibilityChangeEvent);
|
|
21951
21921
|
|
|
21952
21922
|
if (
|
|
21953
|
-
((
|
|
21954
|
-
|
|
21955
|
-
a2,
|
|
21956
|
-
a3
|
|
21957
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
21958
|
-
eventTypeId,
|
|
21923
|
+
((a1, a2, a3) => {})(
|
|
21924
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
21959
21925
|
visibilityChangeEvent,
|
|
21960
21926
|
userData
|
|
21961
21927
|
)
|
|
@@ -22075,12 +22041,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22075
22041
|
HEAP32[(touchEvent + 8) >> 2] = numTouches;
|
|
22076
22042
|
|
|
22077
22043
|
if (
|
|
22078
|
-
((
|
|
22079
|
-
|
|
22080
|
-
a2,
|
|
22081
|
-
a3
|
|
22082
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22083
|
-
eventTypeId,
|
|
22044
|
+
((a1, a2, a3) => {})(
|
|
22045
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
22084
22046
|
touchEvent,
|
|
22085
22047
|
userData
|
|
22086
22048
|
)
|
|
@@ -22218,12 +22180,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22218
22180
|
fillGamepadEventData(gamepadEvent, e['gamepad']);
|
|
22219
22181
|
|
|
22220
22182
|
if (
|
|
22221
|
-
((
|
|
22222
|
-
|
|
22223
|
-
a2,
|
|
22224
|
-
a3
|
|
22225
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22226
|
-
eventTypeId,
|
|
22183
|
+
((a1, a2, a3) => {})(
|
|
22184
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
22227
22185
|
gamepadEvent,
|
|
22228
22186
|
userData
|
|
22229
22187
|
)
|
|
@@ -22325,12 +22283,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22325
22283
|
) => {
|
|
22326
22284
|
var beforeUnloadEventHandlerFunc = (e = event) => {
|
|
22327
22285
|
// Note: This is always called on the main browser thread, since it needs synchronously return a value!
|
|
22328
|
-
var confirmationMessage = ((
|
|
22329
|
-
|
|
22330
|
-
a2,
|
|
22331
|
-
a3
|
|
22332
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22333
|
-
eventTypeId,
|
|
22286
|
+
var confirmationMessage = ((a1, a2, a3) => {})(
|
|
22287
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
22334
22288
|
0,
|
|
22335
22289
|
userData
|
|
22336
22290
|
);
|
|
@@ -22401,12 +22355,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22401
22355
|
fillBatteryEventData(batteryEvent, battery());
|
|
22402
22356
|
|
|
22403
22357
|
if (
|
|
22404
|
-
((
|
|
22405
|
-
|
|
22406
|
-
a2,
|
|
22407
|
-
a3
|
|
22408
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22409
|
-
eventTypeId,
|
|
22358
|
+
((a1, a2, a3) => {})(
|
|
22359
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
22410
22360
|
batteryEvent,
|
|
22411
22361
|
userData
|
|
22412
22362
|
)
|
|
@@ -22496,11 +22446,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22496
22446
|
|
|
22497
22447
|
var _emscripten_request_animation_frame = (cb, userData) =>
|
|
22498
22448
|
requestAnimationFrame((timeStamp) =>
|
|
22499
|
-
((
|
|
22500
|
-
|
|
22501
|
-
a2
|
|
22502
|
-
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22503
|
-
timeStamp,
|
|
22449
|
+
((a1, a2) => {})(
|
|
22450
|
+
/* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
|
|
22504
22451
|
userData
|
|
22505
22452
|
)
|
|
22506
22453
|
);
|
|
@@ -22512,11 +22459,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22512
22459
|
var _emscripten_request_animation_frame_loop = (cb, userData) => {
|
|
22513
22460
|
function tick(timeStamp) {
|
|
22514
22461
|
if (
|
|
22515
|
-
((
|
|
22516
|
-
|
|
22517
|
-
a2
|
|
22518
|
-
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22519
|
-
timeStamp,
|
|
22462
|
+
((a1, a2) => {})(
|
|
22463
|
+
/* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ timeStamp,
|
|
22520
22464
|
userData
|
|
22521
22465
|
)
|
|
22522
22466
|
) {
|
|
@@ -22741,10 +22685,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22741
22685
|
return emSetImmediate(() => {
|
|
22742
22686
|
runtimeKeepalivePop();
|
|
22743
22687
|
callUserCallback(() =>
|
|
22744
|
-
((
|
|
22745
|
-
|
|
22746
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22747
|
-
userData
|
|
22688
|
+
((a1) => {})(
|
|
22689
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
|
|
22748
22690
|
)
|
|
22749
22691
|
);
|
|
22750
22692
|
});
|
|
@@ -22761,10 +22703,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22761
22703
|
function tick() {
|
|
22762
22704
|
callUserCallback(() => {
|
|
22763
22705
|
if (
|
|
22764
|
-
((
|
|
22765
|
-
|
|
22766
|
-
) => {}) /* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22767
|
-
userData
|
|
22706
|
+
((a1) => {})(
|
|
22707
|
+
/* a dynamic function call to signature ii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
|
|
22768
22708
|
)
|
|
22769
22709
|
) {
|
|
22770
22710
|
emSetImmediate(tick);
|
|
@@ -22781,10 +22721,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22781
22721
|
var _emscripten_set_timeout = (cb, msecs, userData) =>
|
|
22782
22722
|
safeSetTimeout(
|
|
22783
22723
|
() =>
|
|
22784
|
-
((
|
|
22785
|
-
|
|
22786
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22787
|
-
userData
|
|
22724
|
+
((a1) => {})(
|
|
22725
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
|
|
22788
22726
|
),
|
|
22789
22727
|
msecs
|
|
22790
22728
|
);
|
|
@@ -22800,11 +22738,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22800
22738
|
runtimeKeepalivePop();
|
|
22801
22739
|
callUserCallback(() => {
|
|
22802
22740
|
if (
|
|
22803
|
-
((
|
|
22804
|
-
|
|
22805
|
-
a2
|
|
22806
|
-
) => {}) /* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22807
|
-
t,
|
|
22741
|
+
((a1, a2) => {})(
|
|
22742
|
+
/* a dynamic function call to signature idi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ t,
|
|
22808
22743
|
userData
|
|
22809
22744
|
)
|
|
22810
22745
|
) {
|
|
@@ -22828,10 +22763,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22828
22763
|
runtimeKeepalivePush();
|
|
22829
22764
|
return setInterval(() => {
|
|
22830
22765
|
callUserCallback(() =>
|
|
22831
|
-
((
|
|
22832
|
-
|
|
22833
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22834
|
-
userData
|
|
22766
|
+
((a1) => {})(
|
|
22767
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
|
|
22835
22768
|
)
|
|
22836
22769
|
);
|
|
22837
22770
|
}, msecs);
|
|
@@ -22846,10 +22779,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22846
22779
|
|
|
22847
22780
|
var _emscripten_async_call = (func, arg, millis) => {
|
|
22848
22781
|
var wrapper = () =>
|
|
22849
|
-
((
|
|
22850
|
-
|
|
22851
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22852
|
-
arg
|
|
22782
|
+
((a1) => {})(
|
|
22783
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
22853
22784
|
);
|
|
22854
22785
|
|
|
22855
22786
|
if (
|
|
@@ -22882,7 +22813,7 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22882
22813
|
|
|
22883
22814
|
var _emscripten_set_main_loop = (func, fps, simulateInfiniteLoop) => {
|
|
22884
22815
|
var iterFunc =
|
|
22885
|
-
() => {} /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate.
|
|
22816
|
+
() => {}; /* a dynamic function call to signature v, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */
|
|
22886
22817
|
setMainLoop(iterFunc, fps, simulateInfiniteLoop);
|
|
22887
22818
|
};
|
|
22888
22819
|
_emscripten_set_main_loop.sig = 'vpii';
|
|
@@ -22894,10 +22825,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22894
22825
|
simulateInfiniteLoop
|
|
22895
22826
|
) => {
|
|
22896
22827
|
var iterFunc = () =>
|
|
22897
|
-
((
|
|
22898
|
-
|
|
22899
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22900
|
-
arg
|
|
22828
|
+
((a1) => {})(
|
|
22829
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
22901
22830
|
);
|
|
22902
22831
|
setMainLoop(iterFunc, fps, simulateInfiniteLoop, arg);
|
|
22903
22832
|
};
|
|
@@ -22918,10 +22847,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22918
22847
|
var __emscripten_push_main_loop_blocker = (func, arg, name) => {
|
|
22919
22848
|
MainLoop.queue.push({
|
|
22920
22849
|
func: () => {
|
|
22921
|
-
((
|
|
22922
|
-
|
|
22923
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22924
|
-
arg
|
|
22850
|
+
((a1) => {})(
|
|
22851
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
22925
22852
|
);
|
|
22926
22853
|
},
|
|
22927
22854
|
name: UTF8ToString(name),
|
|
@@ -22934,10 +22861,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22934
22861
|
var __emscripten_push_uncounted_main_loop_blocker = (func, arg, name) => {
|
|
22935
22862
|
MainLoop.queue.push({
|
|
22936
22863
|
func: () => {
|
|
22937
|
-
((
|
|
22938
|
-
|
|
22939
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22940
|
-
arg
|
|
22864
|
+
((a1) => {})(
|
|
22865
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
22941
22866
|
);
|
|
22942
22867
|
},
|
|
22943
22868
|
name: UTF8ToString(name),
|
|
@@ -22971,12 +22896,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
22971
22896
|
var resultPtr = stackAlloc(POINTER_SIZE);
|
|
22972
22897
|
HEAPU32[resultPtr >> 2] = 0;
|
|
22973
22898
|
try {
|
|
22974
|
-
var result = ((
|
|
22975
|
-
|
|
22976
|
-
a2,
|
|
22977
|
-
a3
|
|
22978
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
22979
|
-
resultPtr,
|
|
22899
|
+
var result = ((a1, a2, a3) => {})(
|
|
22900
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ resultPtr,
|
|
22980
22901
|
userData,
|
|
22981
22902
|
value
|
|
22982
22903
|
);
|
|
@@ -23110,52 +23031,6 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
23110
23031
|
_emscripten_promise_await.sig = 'vpp';
|
|
23111
23032
|
_emscripten_promise_await.isAsync = true;
|
|
23112
23033
|
|
|
23113
|
-
var ___resumeException = (ptr) => {
|
|
23114
|
-
if (!exceptionLast) {
|
|
23115
|
-
exceptionLast = ptr;
|
|
23116
|
-
}
|
|
23117
|
-
throw exceptionLast;
|
|
23118
|
-
};
|
|
23119
|
-
___resumeException.sig = 'vp';
|
|
23120
|
-
|
|
23121
|
-
var findMatchingCatch = (args) => {
|
|
23122
|
-
var thrown = exceptionLast;
|
|
23123
|
-
if (!thrown) {
|
|
23124
|
-
// just pass through the null ptr
|
|
23125
|
-
setTempRet0(0);
|
|
23126
|
-
return 0;
|
|
23127
|
-
}
|
|
23128
|
-
var info = new ExceptionInfo(thrown);
|
|
23129
|
-
info.set_adjusted_ptr(thrown);
|
|
23130
|
-
var thrownType = info.get_type();
|
|
23131
|
-
if (!thrownType) {
|
|
23132
|
-
// just pass through the thrown ptr
|
|
23133
|
-
setTempRet0(0);
|
|
23134
|
-
return thrown;
|
|
23135
|
-
}
|
|
23136
|
-
|
|
23137
|
-
// can_catch receives a **, add indirection
|
|
23138
|
-
// The different catch blocks are denoted by different types.
|
|
23139
|
-
// Due to inheritance, those types may not precisely match the
|
|
23140
|
-
// type of the thrown object. Find one which matches, and
|
|
23141
|
-
// return the type of the catch block which should be called.
|
|
23142
|
-
for (var caughtType of args) {
|
|
23143
|
-
if (caughtType === 0 || caughtType === thrownType) {
|
|
23144
|
-
// Catch all clause matched or exactly the same type is caught
|
|
23145
|
-
break;
|
|
23146
|
-
}
|
|
23147
|
-
var adjusted_ptr_addr = info.ptr + 16;
|
|
23148
|
-
if (___cxa_can_catch(caughtType, thrownType, adjusted_ptr_addr)) {
|
|
23149
|
-
setTempRet0(caughtType);
|
|
23150
|
-
return thrown;
|
|
23151
|
-
}
|
|
23152
|
-
}
|
|
23153
|
-
setTempRet0(thrownType);
|
|
23154
|
-
return thrown;
|
|
23155
|
-
};
|
|
23156
|
-
var ___cxa_find_matching_catch_2 = () => findMatchingCatch([]);
|
|
23157
|
-
___cxa_find_matching_catch_2.sig = 'p';
|
|
23158
|
-
|
|
23159
23034
|
var ___cxa_find_matching_catch_3 = (arg0) => findMatchingCatch([arg0]);
|
|
23160
23035
|
___cxa_find_matching_catch_3.sig = 'pp';
|
|
23161
23036
|
|
|
@@ -23912,19 +23787,15 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
23912
23787
|
() => {
|
|
23913
23788
|
runtimeKeepalivePop();
|
|
23914
23789
|
if (onload)
|
|
23915
|
-
((
|
|
23916
|
-
|
|
23917
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23918
|
-
file
|
|
23790
|
+
((a1) => {})(
|
|
23791
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
|
|
23919
23792
|
);
|
|
23920
23793
|
},
|
|
23921
23794
|
() => {
|
|
23922
23795
|
runtimeKeepalivePop();
|
|
23923
23796
|
if (onerror)
|
|
23924
|
-
((
|
|
23925
|
-
|
|
23926
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23927
|
-
file
|
|
23797
|
+
((a1) => {})(
|
|
23798
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ file
|
|
23928
23799
|
);
|
|
23929
23800
|
},
|
|
23930
23801
|
true // don'tCreateFile - it's already there
|
|
@@ -23958,21 +23829,16 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
23958
23829
|
() => {
|
|
23959
23830
|
runtimeKeepalivePop();
|
|
23960
23831
|
if (onload)
|
|
23961
|
-
((
|
|
23962
|
-
|
|
23963
|
-
a2
|
|
23964
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23965
|
-
arg,
|
|
23832
|
+
((a1, a2) => {})(
|
|
23833
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
|
|
23966
23834
|
cname
|
|
23967
23835
|
);
|
|
23968
23836
|
},
|
|
23969
23837
|
() => {
|
|
23970
23838
|
runtimeKeepalivePop();
|
|
23971
23839
|
if (onerror)
|
|
23972
|
-
((
|
|
23973
|
-
|
|
23974
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
23975
|
-
arg
|
|
23840
|
+
((a1) => {})(
|
|
23841
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
23976
23842
|
);
|
|
23977
23843
|
},
|
|
23978
23844
|
true // don'tCreateFile - it's already there
|
|
@@ -24245,10 +24111,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24245
24111
|
runtimeKeepalivePop();
|
|
24246
24112
|
callUserCallback(() => {
|
|
24247
24113
|
var sp = stackSave();
|
|
24248
|
-
((
|
|
24249
|
-
|
|
24250
|
-
|
|
24251
|
-
|
|
24114
|
+
((a1) => {})(
|
|
24115
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stringToUTF8OnStack(
|
|
24116
|
+
_file
|
|
24117
|
+
)
|
|
24252
24118
|
);
|
|
24253
24119
|
stackRestore(sp);
|
|
24254
24120
|
});
|
|
@@ -24292,12 +24158,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24292
24158
|
callUserCallback(() => {
|
|
24293
24159
|
var buffer = _malloc(byteArray.length);
|
|
24294
24160
|
HEAPU8.set(byteArray, buffer);
|
|
24295
|
-
((
|
|
24296
|
-
|
|
24297
|
-
a2,
|
|
24298
|
-
a3
|
|
24299
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24300
|
-
userdata,
|
|
24161
|
+
((a1, a2, a3) => {})(
|
|
24162
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata,
|
|
24301
24163
|
buffer,
|
|
24302
24164
|
byteArray.length
|
|
24303
24165
|
);
|
|
@@ -24307,10 +24169,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24307
24169
|
if (onerror) {
|
|
24308
24170
|
runtimeKeepalivePop();
|
|
24309
24171
|
callUserCallback(() => {
|
|
24310
|
-
((
|
|
24311
|
-
|
|
24312
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24313
|
-
userdata
|
|
24172
|
+
((a1) => {})(
|
|
24173
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userdata
|
|
24314
24174
|
);
|
|
24315
24175
|
});
|
|
24316
24176
|
}
|
|
@@ -24367,12 +24227,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24367
24227
|
);
|
|
24368
24228
|
if (onload) {
|
|
24369
24229
|
var sp = stackSave();
|
|
24370
|
-
((
|
|
24371
|
-
|
|
24372
|
-
a2,
|
|
24373
|
-
a3
|
|
24374
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24375
|
-
handle,
|
|
24230
|
+
((a1, a2, a3) => {})(
|
|
24231
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
|
|
24376
24232
|
userdata,
|
|
24377
24233
|
stringToUTF8OnStack(_file)
|
|
24378
24234
|
);
|
|
@@ -24380,12 +24236,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24380
24236
|
}
|
|
24381
24237
|
} else {
|
|
24382
24238
|
if (onerror)
|
|
24383
|
-
((
|
|
24384
|
-
|
|
24385
|
-
a2,
|
|
24386
|
-
a3
|
|
24387
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24388
|
-
handle,
|
|
24239
|
+
((a1, a2, a3) => {})(
|
|
24240
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
|
|
24389
24241
|
userdata,
|
|
24390
24242
|
http.status
|
|
24391
24243
|
);
|
|
@@ -24398,12 +24250,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24398
24250
|
http.onerror = (e) => {
|
|
24399
24251
|
runtimeKeepalivePop();
|
|
24400
24252
|
if (onerror)
|
|
24401
|
-
((
|
|
24402
|
-
|
|
24403
|
-
a2,
|
|
24404
|
-
a3
|
|
24405
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24406
|
-
handle,
|
|
24253
|
+
((a1, a2, a3) => {})(
|
|
24254
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
|
|
24407
24255
|
userdata,
|
|
24408
24256
|
http.status
|
|
24409
24257
|
);
|
|
@@ -24418,12 +24266,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24418
24266
|
) {
|
|
24419
24267
|
var percentComplete = (e.loaded / e.total) * 100;
|
|
24420
24268
|
if (onprogress)
|
|
24421
|
-
((
|
|
24422
|
-
|
|
24423
|
-
a2,
|
|
24424
|
-
a3
|
|
24425
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24426
|
-
handle,
|
|
24269
|
+
((a1, a2, a3) => {})(
|
|
24270
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
|
|
24427
24271
|
userdata,
|
|
24428
24272
|
percentComplete
|
|
24429
24273
|
);
|
|
@@ -24480,13 +24324,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24480
24324
|
if (http.statusText) {
|
|
24481
24325
|
statusText = stringToUTF8OnStack(http.statusText);
|
|
24482
24326
|
}
|
|
24483
|
-
((
|
|
24484
|
-
|
|
24485
|
-
a2,
|
|
24486
|
-
a3,
|
|
24487
|
-
a4
|
|
24488
|
-
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24489
|
-
handle,
|
|
24327
|
+
((a1, a2, a3, a4) => {})(
|
|
24328
|
+
/* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
|
|
24490
24329
|
userdata,
|
|
24491
24330
|
http.status,
|
|
24492
24331
|
statusText
|
|
@@ -24507,13 +24346,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24507
24346
|
var buffer = _malloc(byteArray.length);
|
|
24508
24347
|
HEAPU8.set(byteArray, buffer);
|
|
24509
24348
|
if (onload)
|
|
24510
|
-
((
|
|
24511
|
-
|
|
24512
|
-
a2,
|
|
24513
|
-
a3,
|
|
24514
|
-
a4
|
|
24515
|
-
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24516
|
-
handle,
|
|
24349
|
+
((a1, a2, a3, a4) => {})(
|
|
24350
|
+
/* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
|
|
24517
24351
|
userdata,
|
|
24518
24352
|
buffer,
|
|
24519
24353
|
byteArray.length
|
|
@@ -24534,13 +24368,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24534
24368
|
// PROGRESS
|
|
24535
24369
|
http.onprogress = (e) => {
|
|
24536
24370
|
if (onprogress)
|
|
24537
|
-
((
|
|
24538
|
-
|
|
24539
|
-
a2,
|
|
24540
|
-
a3,
|
|
24541
|
-
a4
|
|
24542
|
-
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24543
|
-
handle,
|
|
24371
|
+
((a1, a2, a3, a4) => {})(
|
|
24372
|
+
/* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ handle,
|
|
24544
24373
|
userdata,
|
|
24545
24374
|
e.loaded,
|
|
24546
24375
|
e.lengthComputable || e.lengthComputable === undefined
|
|
@@ -24660,24 +24489,16 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
24660
24489
|
if (event === 'error') {
|
|
24661
24490
|
withStackSave(() => {
|
|
24662
24491
|
var msg = stringToUTF8OnStack(data[2]);
|
|
24663
|
-
((
|
|
24664
|
-
|
|
24665
|
-
a2,
|
|
24666
|
-
a3,
|
|
24667
|
-
a4
|
|
24668
|
-
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24669
|
-
data[0],
|
|
24492
|
+
((a1, a2, a3, a4) => {})(
|
|
24493
|
+
/* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data[0],
|
|
24670
24494
|
data[1],
|
|
24671
24495
|
msg,
|
|
24672
24496
|
userData
|
|
24673
24497
|
);
|
|
24674
24498
|
});
|
|
24675
24499
|
} else {
|
|
24676
|
-
((
|
|
24677
|
-
|
|
24678
|
-
a2
|
|
24679
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
24680
|
-
data,
|
|
24500
|
+
((a1, a2) => {})(
|
|
24501
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ data,
|
|
24681
24502
|
userData
|
|
24682
24503
|
);
|
|
24683
24504
|
}
|
|
@@ -25143,12 +24964,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25143
24964
|
) => {
|
|
25144
24965
|
var webGlEventHandlerFunc = (e = event) => {
|
|
25145
24966
|
if (
|
|
25146
|
-
((
|
|
25147
|
-
|
|
25148
|
-
a2,
|
|
25149
|
-
a3
|
|
25150
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25151
|
-
eventTypeId,
|
|
24967
|
+
((a1, a2, a3) => {})(
|
|
24968
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ eventTypeId,
|
|
25152
24969
|
0,
|
|
25153
24970
|
userData
|
|
25154
24971
|
)
|
|
@@ -25367,21 +25184,15 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25367
25184
|
) {
|
|
25368
25185
|
event.preventDefault();
|
|
25369
25186
|
GLUT.saveModifiers(event);
|
|
25370
|
-
((
|
|
25371
|
-
|
|
25372
|
-
a2
|
|
25373
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25374
|
-
lastX,
|
|
25187
|
+
((a1, a2) => {})(
|
|
25188
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
|
|
25375
25189
|
lastY
|
|
25376
25190
|
);
|
|
25377
25191
|
} else if (GLUT.buttons != 0 && GLUT.motionFunc) {
|
|
25378
25192
|
event.preventDefault();
|
|
25379
25193
|
GLUT.saveModifiers(event);
|
|
25380
|
-
((
|
|
25381
|
-
|
|
25382
|
-
a2
|
|
25383
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25384
|
-
lastX,
|
|
25194
|
+
((a1, a2) => {})(
|
|
25195
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ lastX,
|
|
25385
25196
|
lastY
|
|
25386
25197
|
);
|
|
25387
25198
|
}
|
|
@@ -25542,12 +25353,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25542
25353
|
if (GLUT.specialFunc) {
|
|
25543
25354
|
event.preventDefault();
|
|
25544
25355
|
GLUT.saveModifiers(event);
|
|
25545
|
-
((
|
|
25546
|
-
|
|
25547
|
-
a2,
|
|
25548
|
-
a3
|
|
25549
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25550
|
-
key,
|
|
25356
|
+
((a1, a2, a3) => {})(
|
|
25357
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
|
|
25551
25358
|
Browser.mouseX,
|
|
25552
25359
|
Browser.mouseY
|
|
25553
25360
|
);
|
|
@@ -25557,12 +25364,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25557
25364
|
if (key !== null && GLUT.keyboardFunc) {
|
|
25558
25365
|
event.preventDefault();
|
|
25559
25366
|
GLUT.saveModifiers(event);
|
|
25560
|
-
((
|
|
25561
|
-
|
|
25562
|
-
a2,
|
|
25563
|
-
a3
|
|
25564
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25565
|
-
key,
|
|
25367
|
+
((a1, a2, a3) => {})(
|
|
25368
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
|
|
25566
25369
|
Browser.mouseX,
|
|
25567
25370
|
Browser.mouseY
|
|
25568
25371
|
);
|
|
@@ -25577,12 +25380,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25577
25380
|
if (GLUT.specialUpFunc) {
|
|
25578
25381
|
event.preventDefault();
|
|
25579
25382
|
GLUT.saveModifiers(event);
|
|
25580
|
-
((
|
|
25581
|
-
|
|
25582
|
-
a2,
|
|
25583
|
-
a3
|
|
25584
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25585
|
-
key,
|
|
25383
|
+
((a1, a2, a3) => {})(
|
|
25384
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
|
|
25586
25385
|
Browser.mouseX,
|
|
25587
25386
|
Browser.mouseY
|
|
25588
25387
|
);
|
|
@@ -25592,12 +25391,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25592
25391
|
if (key !== null && GLUT.keyboardUpFunc) {
|
|
25593
25392
|
event.preventDefault();
|
|
25594
25393
|
GLUT.saveModifiers(event);
|
|
25595
|
-
((
|
|
25596
|
-
|
|
25597
|
-
a2,
|
|
25598
|
-
a3
|
|
25599
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25600
|
-
key,
|
|
25394
|
+
((a1, a2, a3) => {})(
|
|
25395
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ key,
|
|
25601
25396
|
Browser.mouseX,
|
|
25602
25397
|
Browser.mouseY
|
|
25603
25398
|
);
|
|
@@ -25661,13 +25456,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25661
25456
|
} catch (e) {}
|
|
25662
25457
|
event.preventDefault();
|
|
25663
25458
|
GLUT.saveModifiers(event);
|
|
25664
|
-
((
|
|
25665
|
-
|
|
25666
|
-
|
|
25667
|
-
|
|
25668
|
-
a4
|
|
25669
|
-
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25670
|
-
event['button'],
|
|
25459
|
+
((a1, a2, a3, a4) => {})(
|
|
25460
|
+
/* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
|
|
25461
|
+
'button'
|
|
25462
|
+
],
|
|
25671
25463
|
0 /*GLUT_DOWN*/,
|
|
25672
25464
|
Browser.mouseX,
|
|
25673
25465
|
Browser.mouseY
|
|
@@ -25682,13 +25474,10 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25682
25474
|
if (GLUT.mouseFunc) {
|
|
25683
25475
|
event.preventDefault();
|
|
25684
25476
|
GLUT.saveModifiers(event);
|
|
25685
|
-
((
|
|
25686
|
-
|
|
25687
|
-
|
|
25688
|
-
|
|
25689
|
-
a4
|
|
25690
|
-
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25691
|
-
event['button'],
|
|
25477
|
+
((a1, a2, a3, a4) => {})(
|
|
25478
|
+
/* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ event[
|
|
25479
|
+
'button'
|
|
25480
|
+
],
|
|
25692
25481
|
1 /*GLUT_UP*/,
|
|
25693
25482
|
Browser.mouseX,
|
|
25694
25483
|
Browser.mouseY
|
|
@@ -25717,13 +25506,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25717
25506
|
if (GLUT.mouseFunc) {
|
|
25718
25507
|
event.preventDefault();
|
|
25719
25508
|
GLUT.saveModifiers(event);
|
|
25720
|
-
((
|
|
25721
|
-
|
|
25722
|
-
a2,
|
|
25723
|
-
a3,
|
|
25724
|
-
a4
|
|
25725
|
-
) => {}) /* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25726
|
-
button,
|
|
25509
|
+
((a1, a2, a3, a4) => {})(
|
|
25510
|
+
/* a dynamic function call to signature viiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ button,
|
|
25727
25511
|
0 /*GLUT_DOWN*/,
|
|
25728
25512
|
Browser.mouseX,
|
|
25729
25513
|
Browser.mouseY
|
|
@@ -25766,11 +25550,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25766
25550
|
/* Can't call _glutReshapeWindow as that requests cancelling fullscreen. */
|
|
25767
25551
|
if (GLUT.reshapeFunc) {
|
|
25768
25552
|
// out("GLUT.reshapeFunc (from FS): " + width + ", " + height);
|
|
25769
|
-
((
|
|
25770
|
-
|
|
25771
|
-
a2
|
|
25772
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25773
|
-
width,
|
|
25553
|
+
((a1, a2) => {})(
|
|
25554
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
|
|
25774
25555
|
height
|
|
25775
25556
|
);
|
|
25776
25557
|
}
|
|
@@ -25813,11 +25594,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25813
25594
|
|
|
25814
25595
|
Browser.resizeListeners.push((width, height) => {
|
|
25815
25596
|
if (GLUT.reshapeFunc) {
|
|
25816
|
-
((
|
|
25817
|
-
|
|
25818
|
-
a2
|
|
25819
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25820
|
-
width,
|
|
25597
|
+
((a1, a2) => {})(
|
|
25598
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
|
|
25821
25599
|
height
|
|
25822
25600
|
);
|
|
25823
25601
|
}
|
|
@@ -25930,10 +25708,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
25930
25708
|
var _glutTimerFunc = (msec, func, value) =>
|
|
25931
25709
|
safeSetTimeout(
|
|
25932
25710
|
() =>
|
|
25933
|
-
((
|
|
25934
|
-
|
|
25935
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
25936
|
-
value
|
|
25711
|
+
((a1) => {})(
|
|
25712
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ value
|
|
25937
25713
|
),
|
|
25938
25714
|
msec
|
|
25939
25715
|
);
|
|
@@ -26093,11 +25869,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
26093
25869
|
Browser.setCanvasSize(width, height, true); // N.B. GLUT.reshapeFunc is also registered as a canvas resize callback.
|
|
26094
25870
|
// Just call it once here.
|
|
26095
25871
|
if (GLUT.reshapeFunc) {
|
|
26096
|
-
((
|
|
26097
|
-
|
|
26098
|
-
a2
|
|
26099
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
26100
|
-
width,
|
|
25872
|
+
((a1, a2) => {})(
|
|
25873
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ width,
|
|
26101
25874
|
height
|
|
26102
25875
|
);
|
|
26103
25876
|
}
|
|
@@ -27159,21 +26932,15 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27159
26932
|
callUserCallback(() => {
|
|
27160
26933
|
if (error) {
|
|
27161
26934
|
if (onerror)
|
|
27162
|
-
((
|
|
27163
|
-
|
|
27164
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27165
|
-
arg
|
|
26935
|
+
((a1) => {})(
|
|
26936
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
27166
26937
|
);
|
|
27167
26938
|
return;
|
|
27168
26939
|
}
|
|
27169
26940
|
var buffer = _malloc(byteArray.length);
|
|
27170
26941
|
HEAPU8.set(byteArray, buffer);
|
|
27171
|
-
((
|
|
27172
|
-
|
|
27173
|
-
a2,
|
|
27174
|
-
a3
|
|
27175
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27176
|
-
arg,
|
|
26942
|
+
((a1, a2, a3) => {})(
|
|
26943
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
|
|
27177
26944
|
buffer,
|
|
27178
26945
|
byteArray.length
|
|
27179
26946
|
);
|
|
@@ -27205,18 +26972,14 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27205
26972
|
callUserCallback(() => {
|
|
27206
26973
|
if (error) {
|
|
27207
26974
|
if (onerror)
|
|
27208
|
-
((
|
|
27209
|
-
|
|
27210
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27211
|
-
arg
|
|
26975
|
+
((a1) => {})(
|
|
26976
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
27212
26977
|
);
|
|
27213
26978
|
return;
|
|
27214
26979
|
}
|
|
27215
26980
|
if (onstore)
|
|
27216
|
-
((
|
|
27217
|
-
|
|
27218
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27219
|
-
arg
|
|
26981
|
+
((a1) => {})(
|
|
26982
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
27220
26983
|
);
|
|
27221
26984
|
});
|
|
27222
26985
|
}
|
|
@@ -27231,18 +26994,14 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27231
26994
|
callUserCallback(() => {
|
|
27232
26995
|
if (error) {
|
|
27233
26996
|
if (onerror)
|
|
27234
|
-
((
|
|
27235
|
-
|
|
27236
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27237
|
-
arg
|
|
26997
|
+
((a1) => {})(
|
|
26998
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
27238
26999
|
);
|
|
27239
27000
|
return;
|
|
27240
27001
|
}
|
|
27241
27002
|
if (ondelete)
|
|
27242
|
-
((
|
|
27243
|
-
|
|
27244
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27245
|
-
arg
|
|
27003
|
+
((a1) => {})(
|
|
27004
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
27246
27005
|
);
|
|
27247
27006
|
});
|
|
27248
27007
|
});
|
|
@@ -27259,19 +27018,14 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27259
27018
|
callUserCallback(() => {
|
|
27260
27019
|
if (error) {
|
|
27261
27020
|
if (onerror)
|
|
27262
|
-
((
|
|
27263
|
-
|
|
27264
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27265
|
-
arg
|
|
27021
|
+
((a1) => {})(
|
|
27022
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
27266
27023
|
);
|
|
27267
27024
|
return;
|
|
27268
27025
|
}
|
|
27269
27026
|
if (oncheck)
|
|
27270
|
-
((
|
|
27271
|
-
|
|
27272
|
-
a2
|
|
27273
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27274
|
-
arg,
|
|
27027
|
+
((a1, a2) => {})(
|
|
27028
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg,
|
|
27275
27029
|
exists
|
|
27276
27030
|
);
|
|
27277
27031
|
});
|
|
@@ -27287,18 +27041,14 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27287
27041
|
callUserCallback(() => {
|
|
27288
27042
|
if (error) {
|
|
27289
27043
|
if (onerror)
|
|
27290
|
-
((
|
|
27291
|
-
|
|
27292
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27293
|
-
arg
|
|
27044
|
+
((a1) => {})(
|
|
27045
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
27294
27046
|
);
|
|
27295
27047
|
return;
|
|
27296
27048
|
}
|
|
27297
27049
|
if (onclear)
|
|
27298
|
-
((
|
|
27299
|
-
|
|
27300
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27301
|
-
arg
|
|
27050
|
+
((a1) => {})(
|
|
27051
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ arg
|
|
27302
27052
|
);
|
|
27303
27053
|
});
|
|
27304
27054
|
});
|
|
@@ -27455,11 +27205,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27455
27205
|
safeSetTimeout(() => {
|
|
27456
27206
|
var stackBegin = Asyncify.currData + 12;
|
|
27457
27207
|
var stackEnd = HEAPU32[Asyncify.currData >> 2];
|
|
27458
|
-
((
|
|
27459
|
-
|
|
27460
|
-
a2
|
|
27461
|
-
) => {}) /* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27462
|
-
stackBegin,
|
|
27208
|
+
((a1, a2) => {})(
|
|
27209
|
+
/* a dynamic function call to signature vii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ stackBegin,
|
|
27463
27210
|
stackEnd
|
|
27464
27211
|
);
|
|
27465
27212
|
wakeUp();
|
|
@@ -27520,10 +27267,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
27520
27267
|
HEAPU32[(newFiber + 12) >> 2] = 0;
|
|
27521
27268
|
|
|
27522
27269
|
var userData = HEAPU32[(newFiber + 16) >> 2];
|
|
27523
|
-
((
|
|
27524
|
-
|
|
27525
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
27526
|
-
userData
|
|
27270
|
+
((a1) => {})(
|
|
27271
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ userData
|
|
27527
27272
|
);
|
|
27528
27273
|
} else {
|
|
27529
27274
|
var asyncifyData = newFiber + 20;
|
|
@@ -28535,11 +28280,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
28535
28280
|
if (!SDL.eventHandler) return;
|
|
28536
28281
|
|
|
28537
28282
|
while (SDL.pollEvent(SDL.eventHandlerTemp)) {
|
|
28538
|
-
((
|
|
28539
|
-
|
|
28540
|
-
a2
|
|
28541
|
-
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
28542
|
-
SDL.eventHandlerContext,
|
|
28283
|
+
((a1, a2) => {})(
|
|
28284
|
+
/* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL.eventHandlerContext,
|
|
28543
28285
|
SDL.eventHandlerTemp
|
|
28544
28286
|
);
|
|
28545
28287
|
}
|
|
@@ -30172,12 +29914,9 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
30172
29914
|
return;
|
|
30173
29915
|
|
|
30174
29916
|
// Ask SDL audio data from the user code.
|
|
30175
|
-
((
|
|
30176
|
-
|
|
30177
|
-
|
|
30178
|
-
a3
|
|
30179
|
-
) => {}) /* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30180
|
-
SDL.audio.userdata,
|
|
29917
|
+
((a1, a2, a3) => {})(
|
|
29918
|
+
/* a dynamic function call to signature viii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ SDL
|
|
29919
|
+
.audio.userdata,
|
|
30181
29920
|
SDL.audio.buffer,
|
|
30182
29921
|
SDL.audio.bufferSize
|
|
30183
29922
|
);
|
|
@@ -30635,10 +30374,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
30635
30374
|
info.audio = null;
|
|
30636
30375
|
}
|
|
30637
30376
|
if (SDL.channelFinished) {
|
|
30638
|
-
((
|
|
30639
|
-
|
|
30640
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30641
|
-
channel
|
|
30377
|
+
((a1) => {})(
|
|
30378
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
|
|
30642
30379
|
);
|
|
30643
30380
|
}
|
|
30644
30381
|
}
|
|
@@ -30707,10 +30444,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
30707
30444
|
channelInfo.audio = null;
|
|
30708
30445
|
}
|
|
30709
30446
|
if (SDL.channelFinished)
|
|
30710
|
-
((
|
|
30711
|
-
|
|
30712
|
-
) => {}) /* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
30713
|
-
channel
|
|
30447
|
+
((a1) => {})(
|
|
30448
|
+
/* a dynamic function call to signature vi, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ channel
|
|
30714
30449
|
);
|
|
30715
30450
|
};
|
|
30716
30451
|
if (channelInfo.audio) {
|
|
@@ -31458,11 +31193,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31458
31193
|
var _SDL_AddTimer = (interval, callback, param) =>
|
|
31459
31194
|
safeSetTimeout(
|
|
31460
31195
|
() =>
|
|
31461
|
-
((
|
|
31462
|
-
|
|
31463
|
-
a2
|
|
31464
|
-
) => {}) /* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31465
|
-
interval,
|
|
31196
|
+
((a1, a2) => {})(
|
|
31197
|
+
/* a dynamic function call to signature iii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ interval,
|
|
31466
31198
|
param
|
|
31467
31199
|
),
|
|
31468
31200
|
interval
|
|
@@ -31840,12 +31572,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31840
31572
|
|
|
31841
31573
|
socket.onopen = function (e) {
|
|
31842
31574
|
var eventPtr = WS.getSocketEvent(socketId);
|
|
31843
|
-
((
|
|
31844
|
-
|
|
31845
|
-
a2,
|
|
31846
|
-
a3
|
|
31847
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31848
|
-
0 /*TODO*/,
|
|
31575
|
+
((a1, a2, a3) => {})(
|
|
31576
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
|
|
31849
31577
|
eventPtr,
|
|
31850
31578
|
userData
|
|
31851
31579
|
);
|
|
@@ -31867,12 +31595,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31867
31595
|
|
|
31868
31596
|
socket.onerror = function (e) {
|
|
31869
31597
|
var eventPtr = WS.getSocketEvent(socketId);
|
|
31870
|
-
((
|
|
31871
|
-
|
|
31872
|
-
a2,
|
|
31873
|
-
a3
|
|
31874
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31875
|
-
0 /*TODO*/,
|
|
31598
|
+
((a1, a2, a3) => {})(
|
|
31599
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
|
|
31876
31600
|
eventPtr,
|
|
31877
31601
|
userData
|
|
31878
31602
|
);
|
|
@@ -31897,12 +31621,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31897
31621
|
(HEAP8[eventPtr + 4] = e.wasClean),
|
|
31898
31622
|
(HEAP16[(eventPtr + 6) >> 1] = e.code),
|
|
31899
31623
|
stringToUTF8(e.reason, eventPtr + 8, 512);
|
|
31900
|
-
((
|
|
31901
|
-
|
|
31902
|
-
a2,
|
|
31903
|
-
a3
|
|
31904
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31905
|
-
0 /*TODO*/,
|
|
31624
|
+
((a1, a2, a3) => {})(
|
|
31625
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
|
|
31906
31626
|
eventPtr,
|
|
31907
31627
|
userData
|
|
31908
31628
|
);
|
|
@@ -31936,12 +31656,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
31936
31656
|
(HEAPU32[(eventPtr + 4) >> 2] = buf),
|
|
31937
31657
|
(HEAP32[(eventPtr + 8) >> 2] = len),
|
|
31938
31658
|
(HEAP8[eventPtr + 12] = isText),
|
|
31939
|
-
((
|
|
31940
|
-
|
|
31941
|
-
a2,
|
|
31942
|
-
a3
|
|
31943
|
-
) => {}) /* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */(
|
|
31944
|
-
0 /*TODO*/,
|
|
31659
|
+
((a1, a2, a3) => {})(
|
|
31660
|
+
/* a dynamic function call to signature iiii, but there are no exported function pointers with that signature, so this path should never be taken. Build with ASSERTIONS enabled to validate. */ 0 /*TODO*/,
|
|
31945
31661
|
eventPtr,
|
|
31946
31662
|
userData
|
|
31947
31663
|
);
|
|
@@ -32138,13 +31854,13 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
32138
31854
|
// End JS library code
|
|
32139
31855
|
|
|
32140
31856
|
var ASM_CONSTS = {
|
|
32141
|
-
|
|
31857
|
+
10973133: ($0) => {
|
|
32142
31858
|
if (!$0) {
|
|
32143
31859
|
AL.alcErr = 0xa004;
|
|
32144
31860
|
return 1;
|
|
32145
31861
|
}
|
|
32146
31862
|
},
|
|
32147
|
-
|
|
31863
|
+
10973181: ($0) => {
|
|
32148
31864
|
if (!AL.currentCtx) {
|
|
32149
31865
|
err('alGetProcAddress() called without a valid context');
|
|
32150
31866
|
return 1;
|
|
@@ -34881,10 +34597,16 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
34881
34597
|
/** @export */
|
|
34882
34598
|
glutTimerFunc: _glutTimerFunc,
|
|
34883
34599
|
/** @export */
|
|
34600
|
+
invoke_dii,
|
|
34601
|
+
/** @export */
|
|
34884
34602
|
invoke_i,
|
|
34885
34603
|
/** @export */
|
|
34604
|
+
invoke_id,
|
|
34605
|
+
/** @export */
|
|
34886
34606
|
invoke_ii,
|
|
34887
34607
|
/** @export */
|
|
34608
|
+
invoke_iifi,
|
|
34609
|
+
/** @export */
|
|
34888
34610
|
invoke_iii,
|
|
34889
34611
|
/** @export */
|
|
34890
34612
|
invoke_iiii,
|
|
@@ -34901,10 +34623,16 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
34901
34623
|
/** @export */
|
|
34902
34624
|
invoke_iiiiiiiiii,
|
|
34903
34625
|
/** @export */
|
|
34626
|
+
invoke_iiiiiiiiiii,
|
|
34627
|
+
/** @export */
|
|
34904
34628
|
invoke_iiiij,
|
|
34905
34629
|
/** @export */
|
|
34906
34630
|
invoke_iiij,
|
|
34907
34631
|
/** @export */
|
|
34632
|
+
invoke_iiijj,
|
|
34633
|
+
/** @export */
|
|
34634
|
+
invoke_iij,
|
|
34635
|
+
/** @export */
|
|
34908
34636
|
invoke_iiji,
|
|
34909
34637
|
/** @export */
|
|
34910
34638
|
invoke_iijii,
|
|
@@ -34917,12 +34645,18 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
34917
34645
|
/** @export */
|
|
34918
34646
|
invoke_jiii,
|
|
34919
34647
|
/** @export */
|
|
34648
|
+
invoke_jiji,
|
|
34649
|
+
/** @export */
|
|
34920
34650
|
invoke_v,
|
|
34921
34651
|
/** @export */
|
|
34922
34652
|
invoke_vi,
|
|
34923
34653
|
/** @export */
|
|
34924
34654
|
invoke_vii,
|
|
34925
34655
|
/** @export */
|
|
34656
|
+
invoke_viid,
|
|
34657
|
+
/** @export */
|
|
34658
|
+
invoke_viidddddddd,
|
|
34659
|
+
/** @export */
|
|
34926
34660
|
invoke_viidii,
|
|
34927
34661
|
/** @export */
|
|
34928
34662
|
invoke_viii,
|
|
@@ -34939,6 +34673,8 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
34939
34673
|
/** @export */
|
|
34940
34674
|
invoke_viijii,
|
|
34941
34675
|
/** @export */
|
|
34676
|
+
invoke_vij,
|
|
34677
|
+
/** @export */
|
|
34942
34678
|
invoke_vji,
|
|
34943
34679
|
/** @export */
|
|
34944
34680
|
js_fd_read,
|
|
@@ -35581,6 +35317,165 @@ export function init(RuntimeName, PHPLoader) {
|
|
|
35581
35317
|
}
|
|
35582
35318
|
}
|
|
35583
35319
|
|
|
35320
|
+
function invoke_jiji(index, a1, a2, a3) {
|
|
35321
|
+
var sp = stackSave();
|
|
35322
|
+
try {
|
|
35323
|
+
return Module['dynCall_jiji'](index, a1, a2, a3);
|
|
35324
|
+
} catch (e) {
|
|
35325
|
+
stackRestore(sp);
|
|
35326
|
+
if (e !== e + 0) throw e;
|
|
35327
|
+
_setThrew(1, 0);
|
|
35328
|
+
return 0n;
|
|
35329
|
+
}
|
|
35330
|
+
}
|
|
35331
|
+
|
|
35332
|
+
function invoke_iiijj(index, a1, a2, a3, a4) {
|
|
35333
|
+
var sp = stackSave();
|
|
35334
|
+
try {
|
|
35335
|
+
return Module['dynCall_iiijj'](index, a1, a2, a3, a4);
|
|
35336
|
+
} catch (e) {
|
|
35337
|
+
stackRestore(sp);
|
|
35338
|
+
if (e !== e + 0) throw e;
|
|
35339
|
+
_setThrew(1, 0);
|
|
35340
|
+
}
|
|
35341
|
+
}
|
|
35342
|
+
|
|
35343
|
+
function invoke_iij(index, a1, a2) {
|
|
35344
|
+
var sp = stackSave();
|
|
35345
|
+
try {
|
|
35346
|
+
return Module['dynCall_iij'](index, a1, a2);
|
|
35347
|
+
} catch (e) {
|
|
35348
|
+
stackRestore(sp);
|
|
35349
|
+
if (e !== e + 0) throw e;
|
|
35350
|
+
_setThrew(1, 0);
|
|
35351
|
+
}
|
|
35352
|
+
}
|
|
35353
|
+
|
|
35354
|
+
function invoke_vij(index, a1, a2) {
|
|
35355
|
+
var sp = stackSave();
|
|
35356
|
+
try {
|
|
35357
|
+
Module['dynCall_vij'](index, a1, a2);
|
|
35358
|
+
} catch (e) {
|
|
35359
|
+
stackRestore(sp);
|
|
35360
|
+
if (e !== e + 0) throw e;
|
|
35361
|
+
_setThrew(1, 0);
|
|
35362
|
+
}
|
|
35363
|
+
}
|
|
35364
|
+
|
|
35365
|
+
function invoke_dii(index, a1, a2) {
|
|
35366
|
+
var sp = stackSave();
|
|
35367
|
+
try {
|
|
35368
|
+
return Module['dynCall_dii'](index, a1, a2);
|
|
35369
|
+
} catch (e) {
|
|
35370
|
+
stackRestore(sp);
|
|
35371
|
+
if (e !== e + 0) throw e;
|
|
35372
|
+
_setThrew(1, 0);
|
|
35373
|
+
}
|
|
35374
|
+
}
|
|
35375
|
+
|
|
35376
|
+
function invoke_viid(index, a1, a2, a3) {
|
|
35377
|
+
var sp = stackSave();
|
|
35378
|
+
try {
|
|
35379
|
+
Module['dynCall_viid'](index, a1, a2, a3);
|
|
35380
|
+
} catch (e) {
|
|
35381
|
+
stackRestore(sp);
|
|
35382
|
+
if (e !== e + 0) throw e;
|
|
35383
|
+
_setThrew(1, 0);
|
|
35384
|
+
}
|
|
35385
|
+
}
|
|
35386
|
+
|
|
35387
|
+
function invoke_viidddddddd(
|
|
35388
|
+
index,
|
|
35389
|
+
a1,
|
|
35390
|
+
a2,
|
|
35391
|
+
a3,
|
|
35392
|
+
a4,
|
|
35393
|
+
a5,
|
|
35394
|
+
a6,
|
|
35395
|
+
a7,
|
|
35396
|
+
a8,
|
|
35397
|
+
a9,
|
|
35398
|
+
a10
|
|
35399
|
+
) {
|
|
35400
|
+
var sp = stackSave();
|
|
35401
|
+
try {
|
|
35402
|
+
Module['dynCall_viidddddddd'](
|
|
35403
|
+
index,
|
|
35404
|
+
a1,
|
|
35405
|
+
a2,
|
|
35406
|
+
a3,
|
|
35407
|
+
a4,
|
|
35408
|
+
a5,
|
|
35409
|
+
a6,
|
|
35410
|
+
a7,
|
|
35411
|
+
a8,
|
|
35412
|
+
a9,
|
|
35413
|
+
a10
|
|
35414
|
+
);
|
|
35415
|
+
} catch (e) {
|
|
35416
|
+
stackRestore(sp);
|
|
35417
|
+
if (e !== e + 0) throw e;
|
|
35418
|
+
_setThrew(1, 0);
|
|
35419
|
+
}
|
|
35420
|
+
}
|
|
35421
|
+
|
|
35422
|
+
function invoke_iiiiiiiiiii(
|
|
35423
|
+
index,
|
|
35424
|
+
a1,
|
|
35425
|
+
a2,
|
|
35426
|
+
a3,
|
|
35427
|
+
a4,
|
|
35428
|
+
a5,
|
|
35429
|
+
a6,
|
|
35430
|
+
a7,
|
|
35431
|
+
a8,
|
|
35432
|
+
a9,
|
|
35433
|
+
a10
|
|
35434
|
+
) {
|
|
35435
|
+
var sp = stackSave();
|
|
35436
|
+
try {
|
|
35437
|
+
return Module['dynCall_iiiiiiiiiii'](
|
|
35438
|
+
index,
|
|
35439
|
+
a1,
|
|
35440
|
+
a2,
|
|
35441
|
+
a3,
|
|
35442
|
+
a4,
|
|
35443
|
+
a5,
|
|
35444
|
+
a6,
|
|
35445
|
+
a7,
|
|
35446
|
+
a8,
|
|
35447
|
+
a9,
|
|
35448
|
+
a10
|
|
35449
|
+
);
|
|
35450
|
+
} catch (e) {
|
|
35451
|
+
stackRestore(sp);
|
|
35452
|
+
if (e !== e + 0) throw e;
|
|
35453
|
+
_setThrew(1, 0);
|
|
35454
|
+
}
|
|
35455
|
+
}
|
|
35456
|
+
|
|
35457
|
+
function invoke_id(index, a1) {
|
|
35458
|
+
var sp = stackSave();
|
|
35459
|
+
try {
|
|
35460
|
+
return Module['dynCall_id'](index, a1);
|
|
35461
|
+
} catch (e) {
|
|
35462
|
+
stackRestore(sp);
|
|
35463
|
+
if (e !== e + 0) throw e;
|
|
35464
|
+
_setThrew(1, 0);
|
|
35465
|
+
}
|
|
35466
|
+
}
|
|
35467
|
+
|
|
35468
|
+
function invoke_iifi(index, a1, a2, a3) {
|
|
35469
|
+
var sp = stackSave();
|
|
35470
|
+
try {
|
|
35471
|
+
return Module['dynCall_iifi'](index, a1, a2, a3);
|
|
35472
|
+
} catch (e) {
|
|
35473
|
+
stackRestore(sp);
|
|
35474
|
+
if (e !== e + 0) throw e;
|
|
35475
|
+
_setThrew(1, 0);
|
|
35476
|
+
}
|
|
35477
|
+
}
|
|
35478
|
+
|
|
35584
35479
|
// include: postamble.js
|
|
35585
35480
|
// === Auto-generated postamble setup entry stuff ===
|
|
35586
35481
|
|