> From: [email protected] (Niels Möller) > Cc: [email protected] > Date: Sat, 31 May 2014 08:18:02 +0200 > > Eli Zaretskii <[email protected]> writes: > > > That jmp instruction is the indirect call I was talking about. This > > is how the Windows loader resolves calls into a DLL. If you "stepi" > > into that instruction with GDB, you will find yourself inside the > > function in the DLL. > > This all makes sense. The problem is, why this doesn't happen when using > the assembly version in x86/arcfour-crypt.asm.
Did you try declaring the prototype of that function with '__attribute__((dllexport))' when compiling the DLL, and with '__attribute__((dllimport)' when linking against the DLL? _______________________________________________ nettle-bugs mailing list [email protected] http://lists.lysator.liu.se/mailman/listinfo/nettle-bugs
