Eli Zaretskii eliz@gnu.org writes:
That jmp instruction is the indirect call I was talking about. This is how the Windows loader resolves calls into a DLL. If you "stepi" into that instruction with GDB, you will find yourself inside the function in the DLL.
This all makes sense. The problem is, why this doesn't happen when using the assembly version in x86/arcfour-crypt.asm. I guess I will have to compare pseudoops and symbol table attributes between working and non-working case to find out. Unless someone here already knows the answer.
Regards, /Niels