SSL3_STATE ints to bools.

Change-Id: I0f153a3e22f960f2b600919b6bacac76b7a95093
Reviewed-on: https://boringssl-review.googlesource.com/19944
Reviewed-by: Steven Valdez <svaldez@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/handshake_client.cc b/ssl/handshake_client.cc
index 49d931b..3469017 100644
--- a/ssl/handshake_client.cc
+++ b/ssl/handshake_client.cc
@@ -581,7 +581,7 @@
     ssl->version = server_version;
     // At this point, the connection's version is known and ssl->version is
     // fixed. Begin enforcing the record-layer version.
-    ssl->s3->have_version = 1;
+    ssl->s3->have_version = true;
   } else if (server_version != ssl->version) {
     OPENSSL_PUT_ERROR(SSL, SSL_R_WRONG_SSL_VERSION);
     ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_PROTOCOL_VERSION);
@@ -630,7 +630,7 @@
       ssl->session->session_id_length != 0 &&
       CBS_mem_equal(&session_id, ssl->session->session_id,
                     ssl->session->session_id_length)) {
-    ssl->s3->session_reused = 1;
+    ssl->s3->session_reused = true;
   } else {
     // The session wasn't resumed. Create a fresh SSL_SESSION to
     // fill out.
@@ -1695,7 +1695,7 @@
   }
 
   hs->handshake_finalized = true;
-  ssl->s3->initial_handshake_complete = 1;
+  ssl->s3->initial_handshake_complete = true;
   ssl_update_cache(hs, SSL_SESS_CACHE_CLIENT);
 
   hs->state = state_done;