Make ssl_parse_serverhello_use_srtp_ext return 0 on failure.

Match most other functions. 03973096f416e694b676160ca481553bb44738eb changed
the call site, but not the function itself.

Change-Id: Iac018cbed8a454f50fb0da5e2419f503d8cb652d
Reviewed-on: https://boringssl-review.googlesource.com/1060
Reviewed-by: Adam Langley <agl@google.com>
diff --git a/ssl/d1_srtp.c b/ssl/d1_srtp.c
index c27d766..fb5d1e7 100644
--- a/ssl/d1_srtp.c
+++ b/ssl/d1_srtp.c
@@ -453,7 +453,7 @@
 		{
 		OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
 		*out_alert = SSL_AD_DECODE_ERROR;
-		return 1;
+		return 0;
 		}
 
 	if (CBS_len(&srtp_mki) != 0)
@@ -461,7 +461,7 @@
 		/* Must be no MKI, since we never offer one. */
 		OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_BAD_SRTP_MKI_VALUE);
 		*out_alert = SSL_AD_ILLEGAL_PARAMETER;
-		return 1;
+		return 0;
 		}
 
 	clnt=SSL_get_srtp_profiles(s);
@@ -471,7 +471,7 @@
 		{
 		OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_NO_SRTP_PROFILES);
 		*out_alert = SSL_AD_DECODE_ERROR;
-		return 1;
+		return 0;
 		}
     
 	/* Check to see if the server gave us something we support
@@ -485,13 +485,13 @@
 			{
 			s->srtp_profile=prof;
 			*out_alert = 0;
-			return 0;
+			return 1;
 			}
 		}
 
 	OPENSSL_PUT_ERROR(SSL, ssl_parse_serverhello_use_srtp_ext, SSL_R_BAD_SRTP_PROTECTION_PROFILE_LIST);
 	*out_alert = SSL_AD_ILLEGAL_PARAMETER;
-	return 1;
+	return 0;
 	}