From: nisse@lysator.liu.se (Niels Möller) Cc: nettle-bugs@lists.lysator.liu.se Date: Sat, 31 May 2014 08:18:02 +0200
Eli Zaretskii eliz@gnu.org writes:
That jmp instruction is the indirect call I was talking about. This is how the Windows loader resolves calls into a DLL. If you "stepi" into that instruction with GDB, you will find yourself inside the function in the DLL.
This all makes sense. The problem is, why this doesn't happen when using the assembly version in x86/arcfour-crypt.asm.
Did you try declaring the prototype of that function with '__attribute__((dllexport))' when compiling the DLL, and with '__attribute__((dllimport)' when linking against the DLL?