Flip SSL_SESSION fields to bool.

Change-Id: I0a3648437f78f37a4b710aaea73084a19be607c5
Reviewed-on: https://boringssl-review.googlesource.com/29485
Reviewed-by: Adam Langley <agl@google.com>
Commit-Queue: Adam Langley <agl@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/handshake_client.cc b/ssl/handshake_client.cc
index 391aa29..bb67235 100644
--- a/ssl/handshake_client.cc
+++ b/ssl/handshake_client.cc
@@ -1581,7 +1581,7 @@
   }
 
   if (renewed_session) {
-    session->not_resumable = 0;
+    session->not_resumable = false;
     SSL_SESSION_free(ssl->session);
     ssl->session = renewed_session.release();
   }
@@ -1635,7 +1635,7 @@
     }
     // Renegotiations do not participate in session resumption.
     if (!ssl->s3->initial_handshake_complete) {
-      ssl->s3->established_session->not_resumable = 0;
+      ssl->s3->established_session->not_resumable = false;
     }
 
     hs->new_session.reset();
diff --git a/ssl/handshake_server.cc b/ssl/handshake_server.cc
index 2456d12..f733402 100644
--- a/ssl/handshake_server.cc
+++ b/ssl/handshake_server.cc
@@ -1478,7 +1478,7 @@
     ssl->s3->established_session.reset(ssl->session);
   } else {
     ssl->s3->established_session = std::move(hs->new_session);
-    ssl->s3->established_session->not_resumable = 0;
+    ssl->s3->established_session->not_resumable = false;
   }
 
   hs->handshake_finalized = true;
diff --git a/ssl/internal.h b/ssl/internal.h
index 494b039..c6b849c 100644
--- a/ssl/internal.h
+++ b/ssl/internal.h
@@ -3303,22 +3303,22 @@
   uint8_t *early_alpn;
   size_t early_alpn_len;
 
-  // extended_master_secret is true if the master secret in this session was
+  // extended_master_secret is whether the master secret in this session was
   // generated using EMS and thus isn't vulnerable to the Triple Handshake
   // attack.
-  unsigned extended_master_secret:1;
+  bool extended_master_secret:1;
 
-  // peer_sha256_valid is non-zero if |peer_sha256| is valid.
-  unsigned peer_sha256_valid:1;  // Non-zero if peer_sha256 is valid
+  // peer_sha256_valid is whether |peer_sha256| is valid.
+  bool peer_sha256_valid:1;  // Non-zero if peer_sha256 is valid
 
   // not_resumable is used to indicate that session resumption is disallowed.
-  unsigned not_resumable:1;
+  bool not_resumable:1;
 
-  // ticket_age_add_valid is non-zero if |ticket_age_add| is valid.
-  unsigned ticket_age_add_valid:1;
+  // ticket_age_add_valid is whether |ticket_age_add| is valid.
+  bool ticket_age_add_valid:1;
 
-  // is_server is true if this session was created by a server.
-  unsigned is_server:1;
+  // is_server is whether this session was created by a server.
+  bool is_server:1;
 };
 
 
diff --git a/ssl/ssl_asn1.cc b/ssl/ssl_asn1.cc
index 078ad1f..531a8ee 100644
--- a/ssl/ssl_asn1.cc
+++ b/ssl/ssl_asn1.cc
@@ -727,7 +727,7 @@
       CBS_len(&age_add) != 0) {
     return nullptr;
   }
-  ret->ticket_age_add_valid = age_add_present;
+  ret->ticket_age_add_valid = age_add_present != 0;
 
   int is_server;
   if (!CBS_get_optional_asn1_bool(&session, &is_server, kIsServerTag,
diff --git a/ssl/ssl_session.cc b/ssl/ssl_session.cc
index 0498aaf..703225e 100644
--- a/ssl/ssl_session.cc
+++ b/ssl/ssl_session.cc
@@ -291,7 +291,7 @@
 
   // The new_session does not get a copy of the ex_data.
 
-  new_session->not_resumable = 1;
+  new_session->not_resumable = true;
   return new_session;
 }
 
@@ -414,7 +414,7 @@
   session->sid_ctx_length = hs->config->cert->sid_ctx_length;
 
   // The session is marked not resumable until it is completely filled in.
-  session->not_resumable = 1;
+  session->not_resumable = true;
   session->verify_result = X509_V_ERR_INVALID_CALL;
 
   hs->new_session = std::move(session);
diff --git a/ssl/ssl_test.cc b/ssl/ssl_test.cc
index 30fcbab..7f5361f 100644
--- a/ssl/ssl_test.cc
+++ b/ssl/ssl_test.cc
@@ -1724,7 +1724,7 @@
       bssl::SSL_SESSION_dup(session0, SSL_SESSION_DUP_ALL);
   ASSERT_TRUE(session1);
 
-  session1->not_resumable = 0;
+  session1->not_resumable = false;
 
   uint8_t *s0_bytes, *s1_bytes;
   size_t s0_len, s1_len;
diff --git a/ssl/tls13_client.cc b/ssl/tls13_client.cc
index b8bd546..317b4d3 100644
--- a/ssl/tls13_client.cc
+++ b/ssl/tls13_client.cc
@@ -891,8 +891,8 @@
     }
   }
 
-  session->ticket_age_add_valid = 1;
-  session->not_resumable = 0;
+  session->ticket_age_add_valid = true;
+  session->not_resumable = false;
 
   if ((ssl->session_ctx->session_cache_mode & SSL_SESS_CACHE_CLIENT) &&
       ssl->session_ctx->new_session_cb != NULL &&
diff --git a/ssl/tls13_server.cc b/ssl/tls13_server.cc
index 81d78fa..481dc54 100644
--- a/ssl/tls13_server.cc
+++ b/ssl/tls13_server.cc
@@ -168,7 +168,7 @@
     if (!RAND_bytes((uint8_t *)&session->ticket_age_add, 4)) {
       return 0;
     }
-    session->ticket_age_add_valid = 1;
+    session->ticket_age_add_valid = true;
     if (ssl->enable_early_data) {
       session->ticket_max_early_data = kMaxEarlyDataAccepted;
     }