File initialize-arrays-as-arrays.patch of Package aws-efs-utils

diff -Nru vendor.orig/src/proxy/vendor/aws-lc-fips-sys-0.13.9/aws-lc/crypto/fipsmodule/self_check/self_check.c vendor/src/proxy/vendor/aws-lc-fips-sys-0.13.9/aws-lc/crypto/fipsmodule/self_check/self_check.c
--- vendor.orig/src/proxy/vendor/aws-lc-fips-sys-0.13.9/aws-lc/crypto/fipsmodule/self_check/self_check.c	1970-01-01 01:00:00.000000000 +0100
+++ vendor/src/proxy/vendor/aws-lc-fips-sys-0.13.9/aws-lc/crypto/fipsmodule/self_check/self_check.c	2025-11-07 14:39:58.744931127 +0100
@@ -1706,7 +1706,8 @@
 }
 
 static int boringssl_self_test_fast(void) {
-  static const uint8_t kAESKey[16] = "BoringCrypto Key";
+  static const uint8_t kAESKey[16] =  {'B', 'o', 'r', 'i', 'n', 'g', 'C', 'r',
+                                       'y', 'p', 't', 'o', ' ', 'K', 'e', 'y'};
   // Older versions of the gcc release build on ARM will optimize out the
   // assembly label for kAESIV, if we define it with {0}. The assembler
   // will set the value of kAESIV to another static constant in the
@@ -1856,8 +1857,11 @@
       0x3f, 0x17, 0x4c, 0xf4, 0x78, 0x7a, 0x4f, 0x1a, 0x40, 0xc2, 0xb5, 0x0b,
       0xab, 0xe1, 0x4a, 0xae, 0x53, 0x0b, 0xe5, 0x88, 0x6d, 0x91, 0x0a, 0x27,
   };
-  static const uint8_t kDRBGPersonalization[18] = "BCMPersonalization";
-  static const uint8_t kDRBGAD[16] = "BCM DRBG KAT AD ";
+  static const uint8_t kDRBGPersonalization[18] = {
+      'B', 'C', 'M', 'P', 'e', 'r', 's', 'o', 'n',
+      'a', 'l', 'i', 'z', 'a', 't', 'i', 'o', 'n'};
+  static const uint8_t kDRBGAD[16] = {'B', 'C', 'M', ' ', 'D', 'R', 'B', 'G',
+                                      ' ', 'K', 'A', 'T', ' ', 'A', 'D', ' '};
   static const uint8_t kDRBGOutput[64] = {
       0x19, 0x1f, 0x2b, 0x49, 0x76, 0x85, 0xfd, 0x51, 0xb6, 0x56, 0xbc,
       0x1c, 0x7d, 0xd5, 0xdd, 0x44, 0x76, 0xa3, 0x5e, 0x17, 0x9b, 0x8e,
openSUSE Build Service is sponsored by