diff --git a/lib/modules/SSL.pmod/handshake.pike b/lib/modules/SSL.pmod/handshake.pike
index 9d41bdc631975a84b9ca84112609c12309ea6a69..ac77941ee9c46841e133d30d09e990bc4b2c0cbd 100644
--- a/lib/modules/SSL.pmod/handshake.pike
+++ b/lib/modules/SSL.pmod/handshake.pike
@@ -1,4 +1,4 @@
-/* $Id: handshake.pike,v 1.6 1998/02/11 05:19:05 nisse Exp $
+/* $Id: handshake.pike,v 1.7 1998/04/20 01:49:37 nisse Exp $
  *
  */
 
@@ -61,11 +61,11 @@ object server_hello_packet()
 {
   object struct = Struct();
   /* Build server_hello message */
-  struct->put_int(3,1); struct->put_int(0,1); /* version */
+  struct->put_uint(3,1); struct->put_uint(0,1); /* version */
   struct->put_fix_string(my_random);
   struct->put_var_string(session->identity, 1);
-  struct->put_int(session->cipher_suite, 2);
-  struct->put_int(session->compression_algorithm, 1);
+  struct->put_uint(session->cipher_suite, 2);
+  struct->put_uint(session->compression_algorithm, 1);
 
   string data = struct->pop_data();
 #ifdef SSL3_DEBUG
@@ -123,7 +123,7 @@ int reply_new_session(array(int) cipher_suites, array(int) compression_methods)
 #ifdef SSL3_DEBUG
 //    werror(sprintf("SSL.handshake: certificate_message size %d\n", len));
 #endif
-    struct->put_int(len + 3 * sizeof(context->certificates), 3);
+    struct->put_uint(len + 3 * sizeof(context->certificates), 3);
     foreach(context->certificates, string cert)
       struct->put_var_string(cert, 3);
     send_packet(handshake_packet(HANDSHAKE_certificate, struct->pop_data()));
@@ -136,10 +136,10 @@ int reply_new_session(array(int) cipher_suites, array(int) compression_methods)
   {
     /* Send a CertificateRequest message */
     object struct = Struct();
-    struct->put_var_array(context->preferred_auth_methods, 1, 1);
+    struct->put_var_uint_array(context->preferred_auth_methods, 1, 1);
 
     int len = `+(@ Array.map(context->authorities, strlen));
-    struct->put_int(len + 2 * sizeof(context->authorities), 2);
+    struct->put_uint(len + 2 * sizeof(context->authorities), 2);
     foreach(context->authorities, string auth)
       struct->put_var_string(auth, 2);
     send_packet(handshake_packet(HANDSHAKE_certificate_request,
@@ -251,12 +251,12 @@ int handle_handshake(int type, string data, string raw)
 	array(int) compression_methods;
              
 	if (catch{
-	  version = input->get_fix_array(1, 2);
+	  version = input->get_fix_uint_array(1, 2);
 	  other_random = input->get_fix_string(32);
 	  id = input->get_var_string(1);
-	  cipher_len = input->get_int(2);
-	  cipher_suites = input->get_fix_array(2, cipher_len/2);
-	  compression_methods = input->get_var_array(1, 1);
+	  cipher_len = input->get_uint(2);
+	  cipher_suites = input->get_fix_uint_array(2, cipher_len/2);
+	  compression_methods = input->get_var_uint_array(1, 1);
 	} || (version[0] != 3) || (cipher_len & 1))
 	{
 	  send_packet(Alert(ALERT_fatal, ALERT_unexpected_message));
@@ -319,10 +319,10 @@ int handle_handshake(int type, string data, string raw)
 	int ch_len;
 	array(int) version;
 	if (catch{
-	  version = input->get_fix_array(1, 2);
-	  ci_len = input->get_int(2);
-	  id_len = input->get_int(2);
-	  ch_len = input->get_int(2);
+	  version = input->get_fix_uint_array(1, 2);
+	  ci_len = input->get_uint(2);
+	  id_len = input->get_uint(2);
+	  ch_len = input->get_uint(2);
 	} || (ci_len % 3) || !ci_len || (id_len) || (ch_len < 16)
 	|| (version[0] != 3))
 	{
@@ -337,7 +337,7 @@ int handle_handshake(int type, string data, string raw)
 
 	string challenge;
 	if (catch{
-	  cipher_suites = input->get_fix_array(3, ci_len/3);
+	  cipher_suites = input->get_fix_uint_array(3, ci_len/3);
 	  challenge = input->get_fix_string(ch_len);
 	} || !input->is_empty()) 
 	{