From 0424017acbd34e14a33002e130c618c5dd6df222 Mon Sep 17 00:00:00 2001
From: Walter Purcaro <vuolter@gmail.com>
Date: Fri, 11 Apr 2014 11:58:46 +0200
Subject: Replace range with xrange Merges vuolter/pyload@a50c8ff

---
 module/plugins/crypter/FilefactoryComFolder.py | 2 +-
 module/plugins/crypter/LixIn.py                | 2 +-
 module/plugins/crypter/SafelinkingNet.py       | 2 +-
 module/plugins/crypter/StealthTo.py            | 2 +-
 module/plugins/crypter/UlozToFolder.py         | 2 +-
 5 files changed, 5 insertions(+), 5 deletions(-)

(limited to 'module/plugins/crypter')

diff --git a/module/plugins/crypter/FilefactoryComFolder.py b/module/plugins/crypter/FilefactoryComFolder.py
index 4f7ed6281..6a1ffea2c 100644
--- a/module/plugins/crypter/FilefactoryComFolder.py
+++ b/module/plugins/crypter/FilefactoryComFolder.py
@@ -23,7 +23,7 @@ class FilefactoryComFolder(Crypter):
         html = self.load(url_base)
 
         new_links = []
-        for i in range(1, 100):
+        for i in xrange(1, 100):
             self.logInfo("Fetching links from page %i" % i)
             found = re.search(self.FOLDER_PATTERN, html, re.DOTALL)
             if found is None: self.fail("Parse error (FOLDER)")
diff --git a/module/plugins/crypter/LixIn.py b/module/plugins/crypter/LixIn.py
index 601490ddd..f180e5677 100644
--- a/module/plugins/crypter/LixIn.py
+++ b/module/plugins/crypter/LixIn.py
@@ -37,7 +37,7 @@ class LixIn(Crypter):
 
         matches = re.search(self.CAPTCHA_PATTERN, self.html)
         if matches:
-            for i in range(5):
+            for _ in xrange(5):
                 matches = re.search(self.CAPTCHA_PATTERN, self.html)
                 if matches:
                     self.logDebug("trying captcha")
diff --git a/module/plugins/crypter/SafelinkingNet.py b/module/plugins/crypter/SafelinkingNet.py
index 458a1f337..e0a3e14af 100644
--- a/module/plugins/crypter/SafelinkingNet.py
+++ b/module/plugins/crypter/SafelinkingNet.py
@@ -43,7 +43,7 @@ class SafelinkingNet(Crypter):
                 postData["link-password"] = password
 
             if "altcaptcha" in self.html:
-                for i in xrange(5):
+                for _ in xrange(5):
                     m = re.search(self.__Solvemedia_pattern__, self.html)
                     if m:
                         captchaKey = m.group(1)
diff --git a/module/plugins/crypter/StealthTo.py b/module/plugins/crypter/StealthTo.py
index 8a73cdfbb..713c9376c 100644
--- a/module/plugins/crypter/StealthTo.py
+++ b/module/plugins/crypter/StealthTo.py
@@ -38,7 +38,7 @@ class StealthTo(Crypter):
             if re.search(r"name=\"id\"", input[0]):
                 ids.append(re.search(r"value=\"([^\"]+)", input[0]).group(1))
 
-        for i in range(0, len(ids)):
+        for i in xrange(0, len(ids)):
             self.req.load(url + "/web",
                           post={"authenticity_token": ats[i], "id": str(ids[i]), "link": ("download_" + str(ids[i]))},
                           cookies=True)
diff --git a/module/plugins/crypter/UlozToFolder.py b/module/plugins/crypter/UlozToFolder.py
index d42605acc..ba049d3b9 100644
--- a/module/plugins/crypter/UlozToFolder.py
+++ b/module/plugins/crypter/UlozToFolder.py
@@ -21,7 +21,7 @@ class UlozToFolder(Crypter):
         html = self.load(self.pyfile.url)
 
         new_links = []
-        for i in range(1, 100):
+        for i in xrange(1, 100):
             self.logInfo("Fetching links from page %i" % i)
             found = re.search(self.FOLDER_PATTERN, html, re.DOTALL)
             if found is None:
-- 
cgit v1.2.3