Skip to content

Commit 7170201

Browse files
committed
range(lit, lit) requires type suffix now
1 parent 5dfc49e commit 7170201

File tree

6 files changed

+8
-8
lines changed

6 files changed

+8
-8
lines changed

src/rust-crypto/bcrypt.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ pub fn bcrypt(cost: uint, salt: &[u8], password: &[u8], output: &mut [u8]) {
2929
// OrpheanBeholderScryDoubt
3030
let mut ctext = [0x4f727068, 0x65616e42, 0x65686f6c, 0x64657253, 0x63727944, 0x6f756274];
3131
for i in range_step(0u, 6u, 2u) {
32-
for _ in range(0, 64) {
32+
for _ in range(0u, 64) {
3333
let (l, r) = state.encrypt(ctext[i], ctext[i+1]);
3434
ctext[i] = l;
3535
ctext[i+1] = r;

src/rust-crypto/bcrypt_pbkdf.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ fn bcrypt_hash(hpass: &[u8], hsalt: &[u8], output: &mut [u8, ..32]) {
1414
let mut bf = Blowfish::init_state();
1515
bf.salted_expand_key(hsalt, hpass);
1616

17-
for _ in range(0, 64) {
17+
for _ in range(0u, 64) {
1818
bf.expand_key(hsalt);
1919
bf.expand_key(hpass);
2020
}
@@ -23,7 +23,7 @@ fn bcrypt_hash(hpass: &[u8], hsalt: &[u8], output: &mut [u8, ..32]) {
2323
read_u32v_be(buf, b"OxychromaticBlowfishSwatDynamite");
2424

2525
for i in range_step(0u, 8, 2) {
26-
for _ in range(0, 64) {
26+
for _ in range(0u, 64) {
2727
let (l, r) = bf.encrypt(buf[i], buf[i+1]);
2828
buf[i] = l;
2929
buf[i+1] = r;

src/rust-crypto/blockmodes.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1155,7 +1155,7 @@ mod test {
11551155
rng2.gen_range(0, max_size)
11561156
};
11571157

1158-
for _ in range(0, 1000) {
1158+
for _ in range(0u, 1000) {
11591159
let mut enc = new_enc();
11601160
let mut dec = new_dec();
11611161

src/rust-crypto/chacha20.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ impl ChaCha20 {
7272
fn update(&mut self) {
7373
let mut x = self.state;
7474

75-
for _ in range(0, 10) {
75+
for _ in range(0u, 10) {
7676
quater_round!(x[0], x[4], x[ 8], x[12]);
7777
quater_round!(x[1], x[5], x[ 9], x[13]);
7878
quater_round!(x[2], x[6], x[10], x[14]);

src/rust-crypto/salsa20.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ impl Salsa20 {
137137
let mut z = [0u32, ..16];
138138
read_u32v_le(x.as_mut_slice(), self.state);
139139
read_u32v_le(z.as_mut_slice(), self.state);
140-
for _ in range(0, 10) {
140+
for _ in range(0u, 10) {
141141
doubleround(&mut z);
142142
}
143143
for i in range(0u, 16) {
@@ -151,7 +151,7 @@ impl Salsa20 {
151151
fn hsalsa20_hash(&mut self) {
152152
let mut x = [0u32, ..16];
153153
read_u32v_le(x.as_mut_slice(), self.state);
154-
for _ in range(0, 10) {
154+
for _ in range(0u, 10) {
155155
doubleround(&mut x);
156156
}
157157
for i in range(0u, 16) {

src/rust-crypto/scrypt.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ fn salsa20_8(input: &[u8], output: &mut [u8]) {
4343
} }
4444
)
4545

46-
for _ in range(0, rounds / 2) {
46+
for _ in range(0u, rounds / 2) {
4747
run_round!(
4848
0x4, 0x0, 0xc, 7;
4949
0x8, 0x4, 0x0, 9;

0 commit comments

Comments
 (0)