Eli Zaretskii <[email protected]> writes:

> That jmp instruction is the indirect call I was talking about.  This
> is how the Windows loader resolves calls into a DLL.  If you "stepi"
> into that instruction with GDB, you will find yourself inside the
> function in the DLL.

This all makes sense. The problem is, why this doesn't happen when using
the assembly version in x86/arcfour-crypt.asm. I guess I will have to
compare pseudoops and symbol table attributes between working and
non-working case to find out. Unless someone here already knows the
answer.

Regards,
/Niels

-- 
Niels Möller. PGP-encrypted email is preferred. Keyid C0B98E26.
Internet email is subject to wholesale government surveillance.
_______________________________________________
nettle-bugs mailing list
[email protected]
http://lists.lysator.liu.se/mailman/listinfo/nettle-bugs

Reply via email to