diff -Nur dropbear-2025.87.orig/src/mlkem768.c dropbear-2025.87/src/mlkem768.c --- dropbear-2025.87.orig/src/mlkem768.c 2025-03-05 15:30:00.000000000 +0100 +++ dropbear-2025.87/src/mlkem768.c 2025-08-08 20:25:51.746419662 +0200 @@ -60,9 +60,6 @@ unsigned char rnd[LIBCRUX_ML_KEM_KEY_PAIR_PRNG_LEN]; struct libcrux_mlkem768_keypair keypair; - static_assert(sizeof(keypair.sk.value) == crypto_kem_mlkem768_SECRETKEYBYTES, "len"); - static_assert(sizeof(keypair.pk.value) == crypto_kem_mlkem768_PUBLICKEYBYTES, "len"); - genrandom(rnd, sizeof(rnd)); keypair = libcrux_ml_kem_mlkem768_portable_generate_key_pair(rnd); memcpy(pk, keypair.pk.value, crypto_kem_mlkem768_PUBLICKEYBYTES); @@ -80,10 +77,6 @@ struct libcrux_mlkem768_enc_result enc; struct libcrux_mlkem768_pk mlkem_pub; - static_assert(sizeof(mlkem_pub.value) == crypto_kem_mlkem768_PUBLICKEYBYTES, "len"); - static_assert(sizeof(enc.fst.value) == crypto_kem_mlkem768_CIPHERTEXTBYTES, "len"); - static_assert(sizeof(enc.snd) == crypto_kem_mlkem768_BYTES, "len"); - memcpy(mlkem_pub.value, pk, crypto_kem_mlkem768_PUBLICKEYBYTES); /* generate and encrypt KEM key with client key */ genrandom(rnd, sizeof(rnd)); @@ -103,9 +96,6 @@ struct libcrux_mlkem768_sk mlkem_priv; struct libcrux_mlkem768_ciphertext mlkem_ciphertext; - static_assert(sizeof(mlkem_priv.value) == crypto_kem_mlkem768_SECRETKEYBYTES, "len"); - static_assert(sizeof(mlkem_ciphertext.value) == crypto_kem_mlkem768_CIPHERTEXTBYTES, "len"); - memcpy(mlkem_priv.value, sk, crypto_kem_mlkem768_SECRETKEYBYTES); memcpy(mlkem_ciphertext.value, c, crypto_kem_mlkem768_CIPHERTEXTBYTES); libcrux_ml_kem_mlkem768_portable_decapsulate(&mlkem_priv,