Eli Zaretskii <[email protected]> writes: > That jmp instruction is the indirect call I was talking about. This > is how the Windows loader resolves calls into a DLL. If you "stepi" > into that instruction with GDB, you will find yourself inside the > function in the DLL.
This all makes sense. The problem is, why this doesn't happen when using the assembly version in x86/arcfour-crypt.asm. I guess I will have to compare pseudoops and symbol table attributes between working and non-working case to find out. Unless someone here already knows the answer. Regards, /Niels -- Niels Möller. PGP-encrypted email is preferred. Keyid C0B98E26. Internet email is subject to wholesale government surveillance. _______________________________________________ nettle-bugs mailing list [email protected] http://lists.lysator.liu.se/mailman/listinfo/nettle-bugs
