> From: [email protected] (Niels Möller)
> Cc: [email protected]
> Date: Sat, 31 May 2014 08:18:02 +0200
> 
> Eli Zaretskii <[email protected]> writes:
> 
> > That jmp instruction is the indirect call I was talking about.  This
> > is how the Windows loader resolves calls into a DLL.  If you "stepi"
> > into that instruction with GDB, you will find yourself inside the
> > function in the DLL.
> 
> This all makes sense. The problem is, why this doesn't happen when using
> the assembly version in x86/arcfour-crypt.asm.

Did you try declaring the prototype of that function with
'__attribute__((dllexport))' when compiling the DLL, and with
'__attribute__((dllimport)' when linking against the DLL?
_______________________________________________
nettle-bugs mailing list
[email protected]
http://lists.lysator.liu.se/mailman/listinfo/nettle-bugs

Reply via email to