SSL3_STATE ints to bools.
Change-Id: I0f153a3e22f960f2b600919b6bacac76b7a95093
Reviewed-on: https://boringssl-review.googlesource.com/19944
Reviewed-by: Steven Valdez <svaldez@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/handshake_client.cc b/ssl/handshake_client.cc
index 49d931b..3469017 100644
--- a/ssl/handshake_client.cc
+++ b/ssl/handshake_client.cc
@@ -581,7 +581,7 @@
ssl->version = server_version;
// At this point, the connection's version is known and ssl->version is
// fixed. Begin enforcing the record-layer version.
- ssl->s3->have_version = 1;
+ ssl->s3->have_version = true;
} else if (server_version != ssl->version) {
OPENSSL_PUT_ERROR(SSL, SSL_R_WRONG_SSL_VERSION);
ssl3_send_alert(ssl, SSL3_AL_FATAL, SSL_AD_PROTOCOL_VERSION);
@@ -630,7 +630,7 @@
ssl->session->session_id_length != 0 &&
CBS_mem_equal(&session_id, ssl->session->session_id,
ssl->session->session_id_length)) {
- ssl->s3->session_reused = 1;
+ ssl->s3->session_reused = true;
} else {
// The session wasn't resumed. Create a fresh SSL_SESSION to
// fill out.
@@ -1695,7 +1695,7 @@
}
hs->handshake_finalized = true;
- ssl->s3->initial_handshake_complete = 1;
+ ssl->s3->initial_handshake_complete = true;
ssl_update_cache(hs, SSL_SESS_CACHE_CLIENT);
hs->state = state_done;