Replace bits in SSL_HANDSHAKE with bool.
Change-Id: I23f1449d8652a4aa3a9006e04c86c9430127800e
Reviewed-on: https://boringssl-review.googlesource.com/19924
Reviewed-by: Steven Valdez <svaldez@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
diff --git a/ssl/tls13_server.cc b/ssl/tls13_server.cc
index 26ce0e1..969f2ec 100644
--- a/ssl/tls13_server.cc
+++ b/ssl/tls13_server.cc
@@ -289,7 +289,7 @@
// TLS 1.3 session tickets are renewed separately as part of the
// NewSessionTicket.
- int unused_renew;
+ bool unused_renew;
UniquePtr<SSL_SESSION> session;
enum ssl_ticket_aead_result_t ret =
ssl_process_ticket(ssl, &session, &unused_renew, CBS_data(&ticket),
@@ -588,7 +588,7 @@
// Only request a certificate if Channel ID isn't negotiated.
if ((ssl->verify_mode & SSL_VERIFY_PEER_IF_NO_OBC) &&
ssl->s3->tlsext_channel_id_valid) {
- hs->cert_request = 0;
+ hs->cert_request = false;
}
}
@@ -698,9 +698,9 @@
hs->hash_len)) {
return ssl_hs_error;
}
- hs->can_early_write = 1;
- hs->can_early_read = 1;
- hs->in_early_data = 1;
+ hs->can_early_write = true;
+ hs->can_early_read = true;
+ hs->in_early_data = true;
hs->tls13_state = state_process_end_of_early_data;
return ssl_hs_read_end_of_early_data;
}