diff --git a/lib/modules/Crypto.pmod/RSA.pike b/lib/modules/Crypto.pmod/RSA.pike
index 4408c7386ddb7eb444e5a67dbe494eab7837efdf..17ba55426a3e65a90e7fbde7775df113cc55b356 100644
--- a/lib/modules/Crypto.pmod/RSA.pike
+++ b/lib/modules/Crypto.pmod/RSA.pike
@@ -1,4 +1,4 @@
-/* $Id: RSA.pike,v 1.5 2004/02/08 03:21:02 nilsson Exp $
+/* $Id: RSA.pike,v 1.6 2004/02/19 14:28:10 nilsson Exp $
  *
  * Follow the PKCS#1 standard for padding and encryption.
  */
@@ -233,7 +233,7 @@ int(0..1) verify(string msg, .Hash h, Gmp.mpz sign)
 //!   Document this function.
 string sha_sign(string message, mixed|void r)
 {
-  string s = Crypto.SHA1.hash(message);
+  string s = Crypto.SHA1->hash(message);
   s = sprintf("%c%s%c%s", 4, "sha1", sizeof(s), s);
   return cooked_sign(s);
 }
@@ -242,7 +242,7 @@ string sha_sign(string message, mixed|void r)
 //!   Document this function.
 int sha_verify(string message, string signature)
 {
-  string s = Crypto.SHA1.hash(message);
+  string s = Crypto.SHA1->hash(message);
   s = sprintf("%c%s%c%s", 4, "sha1", sizeof(s), s);
   return raw_verify(s, Gmp.mpz(signature, 256));
 }
@@ -251,7 +251,7 @@ int sha_verify(string message, string signature)
 //!   Document this function.
 string md5_sign(string message, mixed|void r)
 {
-  string s = Crypto.MD5.hash(message);
+  string s = Crypto.MD5->hash(message);
   s = "0 0\14\6\10*\x86H\x86\xf7\15\2\5\5\0\4\20"+s;
   return cooked_sign(s);
 }
@@ -260,7 +260,7 @@ string md5_sign(string message, mixed|void r)
 //!   Document this function.
 int md5_verify(string message, string signature)
 {
-  string s = Crypto.MD5.hash(message);
+  string s = Crypto.MD5->hash(message);
   s = "0 0\14\6\10*\x86H\x86\xf7\15\2\5\5\0\4\20"+s;
   return raw_verify(s, Gmp.mpz(signature, 256));
 }