N/a not use designated initializers in quiche.

PiperOrigin-RevId: 315939420
Change-Id: I03be7268f268d7b21df82902eb8645f51f28f2c8
diff --git a/quic/core/crypto/certificate_view.cc b/quic/core/crypto/certificate_view.cc
index 3c4e49e..ba6430e 100644
--- a/quic/core/crypto/certificate_view.cc
+++ b/quic/core/crypto/certificate_view.cc
@@ -177,7 +177,7 @@
   }
   bool eof_reached = input->eof() && !pending_message;
   return PemReadResult{
-      .status = (eof_reached ? PemReadResult::kEof : PemReadResult::kError)};
+      (eof_reached ? PemReadResult::kEof : PemReadResult::kError), "", ""};
 }
 
 std::unique_ptr<CertificateView> CertificateView::ParseSingleCertificate(
diff --git a/quic/core/crypto/proof_source_x509.cc b/quic/core/crypto/proof_source_x509.cc
index 6afc65f..e432682 100644
--- a/quic/core/crypto/proof_source_x509.cc
+++ b/quic/core/crypto/proof_source_x509.cc
@@ -104,8 +104,8 @@
   }
 
   certificates_.push_front(Certificate{
-      .chain = chain,
-      .key = std::move(key),
+      chain,
+      std::move(key),
   });
   Certificate* certificate = &certificates_.front();
 
diff --git a/quic/core/quic_linux_socket_utils.cc b/quic/core/quic_linux_socket_utils.cc
index 5100a92..6dd74c3 100644
--- a/quic/core/quic_linux_socket_utils.cc
+++ b/quic/core/quic_linux_socket_utils.cc
@@ -186,7 +186,7 @@
     uint32_t flags;    /* flags defined by enum txtime_flags */
   };
 
-  LinuxSockTxTime so_txtime_val = {.clockid = clockid};
+  LinuxSockTxTime so_txtime_val{clockid, 0};
 
   if (setsockopt(fd, SOL_SOCKET, SO_TXTIME, &so_txtime_val,
                  sizeof(so_txtime_val)) != 0) {
diff --git a/quic/quic_transport/web_transport_fingerprint_proof_verifier_test.cc b/quic/quic_transport/web_transport_fingerprint_proof_verifier_test.cc
index 0432a76..f9f27e5 100644
--- a/quic/quic_transport/web_transport_fingerprint_proof_verifier_test.cc
+++ b/quic/quic_transport/web_transport_fingerprint_proof_verifier_test.cc
@@ -55,9 +55,9 @@
   }
 
   void AddTestCertificate() {
-    EXPECT_TRUE(verifier_->AddFingerprint(CertificateFingerprint{
-        .algorithm = CertificateFingerprint::kSha256,
-        .fingerprint = ComputeSha256Fingerprint(kTestCertificate)}));
+    EXPECT_TRUE(verifier_->AddFingerprint(
+        CertificateFingerprint{CertificateFingerprint::kSha256,
+                               ComputeSha256Fingerprint(kTestCertificate)}));
   }
 
   MockClock clock_;
@@ -137,9 +137,9 @@
 
 TEST_F(WebTransportFingerprintProofVerifierTest, InvalidCertificate) {
   constexpr quiche::QuicheStringPiece kInvalidCertificate = "Hello, world!";
-  ASSERT_TRUE(verifier_->AddFingerprint(CertificateFingerprint{
-      .algorithm = CertificateFingerprint::kSha256,
-      .fingerprint = ComputeSha256Fingerprint(kInvalidCertificate)}));
+  ASSERT_TRUE(verifier_->AddFingerprint(
+      {CertificateFingerprint::kSha256,
+       ComputeSha256Fingerprint(kInvalidCertificate)}));
 
   VerifyResult result = Verify(kInvalidCertificate);
   EXPECT_EQ(result.status, QUIC_FAILURE);
@@ -152,32 +152,30 @@
   // Accept all-uppercase fingerprints.
   verifier_ = std::make_unique<WebTransportFingerprintProofVerifier>(
       &clock_, /*max_validity_days=*/365);
-  EXPECT_TRUE(verifier_->AddFingerprint(CertificateFingerprint{
-      .algorithm = CertificateFingerprint::kSha256,
-      .fingerprint = "F2:E5:46:5E:2B:F7:EC:D6:F6:30:66:A5:A3:75:11:73:4A:A0:EB:"
-                     "7C:47:01:0E:86:D6:75:8E:D4:F4:FA:1B:0F"}));
+  EXPECT_TRUE(verifier_->AddFingerprint(
+      {CertificateFingerprint::kSha256,
+       "F2:E5:46:5E:2B:F7:EC:D6:F6:30:66:A5:A3:75:11:73:4A:A0:EB:"
+       "7C:47:01:0E:86:D6:75:8E:D4:F4:FA:1B:0F"}));
   EXPECT_EQ(Verify(kTestCertificate).detailed_status,
             WebTransportFingerprintProofVerifier::Status::kValidCertificate);
 
   // Reject unknown hash algorithms.
-  EXPECT_FALSE(verifier_->AddFingerprint(CertificateFingerprint{
-      .algorithm = "sha-1",
-      .fingerprint =
-          "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00"}));
+  EXPECT_FALSE(verifier_->AddFingerprint(
+      {"sha-1",
+       "00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00"}));
   // Reject invalid length.
   EXPECT_FALSE(verifier_->AddFingerprint(
-      CertificateFingerprint{.algorithm = CertificateFingerprint::kSha256,
-                             .fingerprint = "00:00:00:00"}));
+      {CertificateFingerprint::kSha256, "00:00:00:00"}));
   // Reject missing colons.
-  EXPECT_FALSE(verifier_->AddFingerprint(CertificateFingerprint{
-      .algorithm = CertificateFingerprint::kSha256,
-      .fingerprint = "00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00."
-                     "00.00.00.00.00.00.00.00.00.00.00.00.00"}));
+  EXPECT_FALSE(verifier_->AddFingerprint(
+      {CertificateFingerprint::kSha256,
+       "00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00.00."
+       "00.00.00.00.00.00.00.00.00.00.00.00.00"}));
   // Reject non-hex symbols.
-  EXPECT_FALSE(verifier_->AddFingerprint(CertificateFingerprint{
-      .algorithm = CertificateFingerprint::kSha256,
-      .fingerprint = "zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:"
-                     "zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz"}));
+  EXPECT_FALSE(verifier_->AddFingerprint(
+      {CertificateFingerprint::kSha256,
+       "zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:"
+       "zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz:zz"}));
 }
 
 }  // namespace