int to bool in ssl_versions.cc.

Bug: 132
Change-Id: I1d6cd1dd7470a3f64ec91b954042ed3f8c6b561e
Reviewed-on: https://boringssl-review.googlesource.com/20825
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: Martin Kreichgauer <martinkr@google.com>
diff --git a/ssl/ssl_versions.cc b/ssl/ssl_versions.cc
index 560d0cf..c06a90e 100644
--- a/ssl/ssl_versions.cc
+++ b/ssl/ssl_versions.cc
@@ -25,14 +25,14 @@
 
 namespace bssl {
 
-int ssl_protocol_version_from_wire(uint16_t *out, uint16_t version) {
+bool ssl_protocol_version_from_wire(uint16_t *out, uint16_t version) {
   switch (version) {
     case SSL3_VERSION:
     case TLS1_VERSION:
     case TLS1_1_VERSION:
     case TLS1_2_VERSION:
       *out = version;
-      return 1;
+      return true;
 
     case TLS1_3_DRAFT_VERSION:
     case TLS1_3_EXPERIMENT_VERSION:
@@ -40,19 +40,19 @@
     case TLS1_3_EXPERIMENT3_VERSION:
     case TLS1_3_RECORD_TYPE_EXPERIMENT_VERSION:
       *out = TLS1_3_VERSION;
-      return 1;
+      return true;
 
     case DTLS1_VERSION:
       // DTLS 1.0 is analogous to TLS 1.1, not TLS 1.0.
       *out = TLS1_1_VERSION;
-      return 1;
+      return true;
 
     case DTLS1_2_VERSION:
       *out = TLS1_2_VERSION;
-      return 1;
+      return true;
 
     default:
-      return 0;
+      return false;
   }
 }
 
@@ -87,21 +87,21 @@
   }
 }
 
-static int method_supports_version(const SSL_PROTOCOL_METHOD *method,
-                                   uint16_t version) {
+static bool method_supports_version(const SSL_PROTOCOL_METHOD *method,
+                                    uint16_t version) {
   const uint16_t *versions;
   size_t num_versions;
   get_method_versions(method, &versions, &num_versions);
   for (size_t i = 0; i < num_versions; i++) {
     if (versions[i] == version) {
-      return 1;
+      return true;
     }
   }
-  return 0;
+  return false;
 }
 
-static int set_version_bound(const SSL_PROTOCOL_METHOD *method, uint16_t *out,
-                             uint16_t version) {
+static bool set_version_bound(const SSL_PROTOCOL_METHOD *method, uint16_t *out,
+                              uint16_t version) {
   // The public API uses wire versions, except we use |TLS1_3_VERSION|
   // everywhere to refer to any draft TLS 1.3 versions. In this direction, we
   // map it to some representative TLS 1.3 draft version.
@@ -111,7 +111,7 @@
       version == TLS1_3_EXPERIMENT3_VERSION ||
       version == TLS1_3_RECORD_TYPE_EXPERIMENT_VERSION) {
     OPENSSL_PUT_ERROR(SSL, SSL_R_UNKNOWN_SSL_VERSION);
-    return 0;
+    return false;
   }
   if (version == TLS1_3_VERSION) {
     version = TLS1_3_DRAFT_VERSION;
@@ -120,30 +120,30 @@
   if (!method_supports_version(method, version) ||
       !ssl_protocol_version_from_wire(out, version)) {
     OPENSSL_PUT_ERROR(SSL, SSL_R_UNKNOWN_SSL_VERSION);
-    return 0;
+    return false;
   }
 
-  return 1;
+  return true;
 }
 
-static int set_min_version(const SSL_PROTOCOL_METHOD *method, uint16_t *out,
-                           uint16_t version) {
+static bool set_min_version(const SSL_PROTOCOL_METHOD *method, uint16_t *out,
+                            uint16_t version) {
   // Zero is interpreted as the default minimum version.
   if (version == 0) {
     // SSL 3.0 is disabled by default and TLS 1.0 does not exist in DTLS.
     *out = method->is_dtls ? TLS1_1_VERSION : TLS1_VERSION;
-    return 1;
+    return true;
   }
 
   return set_version_bound(method, out, version);
 }
 
-static int set_max_version(const SSL_PROTOCOL_METHOD *method, uint16_t *out,
-                           uint16_t version) {
+static bool set_max_version(const SSL_PROTOCOL_METHOD *method, uint16_t *out,
+                            uint16_t version) {
   // Zero is interpreted as the default maximum version.
   if (version == 0) {
     *out = TLS1_2_VERSION;
-    return 1;
+    return true;
   }
 
   return set_version_bound(method, out, version);
@@ -160,8 +160,8 @@
     {TLS1_3_VERSION, SSL_OP_NO_TLSv1_3},
 };
 
-int ssl_get_version_range(const SSL *ssl, uint16_t *out_min_version,
-                          uint16_t *out_max_version) {
+bool ssl_get_version_range(const SSL *ssl, uint16_t *out_min_version,
+                           uint16_t *out_max_version) {
   // For historical reasons, |SSL_OP_NO_DTLSv1| aliases |SSL_OP_NO_TLSv1|, but
   // DTLS 1.0 should be mapped to TLS 1.1.
   uint32_t options = ssl->options;
@@ -185,7 +185,7 @@
   // as a min/max range by picking the lowest contiguous non-empty range of
   // enabled protocols. Note that this means it is impossible to set a maximum
   // version of the higest supported TLS version in a future-proof way.
-  int any_enabled = 0;
+  bool any_enabled = false;
   for (size_t i = 0; i < OPENSSL_ARRAY_SIZE(kProtocolVersions); i++) {
     // Only look at the versions already enabled.
     if (min_version > kProtocolVersions[i].version) {
@@ -198,7 +198,7 @@
     if (!(options & kProtocolVersions[i].flag)) {
       // The minimum version is the first enabled version.
       if (!any_enabled) {
-        any_enabled = 1;
+        any_enabled = true;
         min_version = kProtocolVersions[i].version;
       }
       continue;
@@ -214,12 +214,12 @@
 
   if (!any_enabled) {
     OPENSSL_PUT_ERROR(SSL, SSL_R_NO_SUPPORTED_VERSIONS_ENABLED);
-    return 0;
+    return false;
   }
 
   *out_min_version = min_version;
   *out_max_version = max_version;
-  return 1;
+  return true;
 }
 
 static uint16_t ssl_version(const SSL *ssl) {
@@ -275,7 +275,7 @@
   return version;
 }
 
-int ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version) {
+bool ssl_supports_version(SSL_HANDSHAKE *hs, uint16_t version) {
   SSL *const ssl = hs->ssl;
   // As a client, only allow the configured TLS 1.3 variant. As a server,
   // support all TLS 1.3 variants as long as tls13_variant is set to a
@@ -286,7 +286,7 @@
          version == TLS1_3_EXPERIMENT2_VERSION ||
          version == TLS1_3_EXPERIMENT3_VERSION ||
          version == TLS1_3_RECORD_TYPE_EXPERIMENT_VERSION)) {
-      return 0;
+      return false;
     }
   } else {
     if ((ssl->tls13_variant != tls13_experiment &&
@@ -300,7 +300,7 @@
          version == TLS1_3_RECORD_TYPE_EXPERIMENT_VERSION) ||
         (ssl->tls13_variant != tls13_default &&
          version == TLS1_3_DRAFT_VERSION)) {
-      return 0;
+      return false;
     }
   }
 
@@ -311,21 +311,21 @@
          protocol_version <= hs->max_version;
 }
 
-int ssl_add_supported_versions(SSL_HANDSHAKE *hs, CBB *cbb) {
+bool ssl_add_supported_versions(SSL_HANDSHAKE *hs, CBB *cbb) {
   const uint16_t *versions;
   size_t num_versions;
   get_method_versions(hs->ssl->method, &versions, &num_versions);
   for (size_t i = 0; i < num_versions; i++) {
     if (ssl_supports_version(hs, versions[i]) &&
         !CBB_add_u16(cbb, versions[i])) {
-      return 0;
+      return false;
     }
   }
-  return 1;
+  return true;
 }
 
-int ssl_negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert,
-                          uint16_t *out_version, const CBS *peer_versions) {
+bool ssl_negotiate_version(SSL_HANDSHAKE *hs, uint8_t *out_alert,
+                           uint16_t *out_version, const CBS *peer_versions) {
   const uint16_t *versions;
   size_t num_versions;
   get_method_versions(hs->ssl->method, &versions, &num_versions);
@@ -340,19 +340,19 @@
       if (!CBS_get_u16(&copy, &version)) {
         OPENSSL_PUT_ERROR(SSL, SSL_R_DECODE_ERROR);
         *out_alert = SSL_AD_DECODE_ERROR;
-        return 0;
+        return false;
       }
 
       if (version == versions[i]) {
         *out_version = version;
-        return 1;
+        return true;
       }
     }
   }
 
   OPENSSL_PUT_ERROR(SSL, SSL_R_UNSUPPORTED_PROTOCOL);
   *out_alert = SSL_AD_PROTOCOL_VERSION;
-  return 0;
+  return false;
 }
 
 bool ssl_is_resumption_experiment(uint16_t version) {