diff -Nur dropbear-2025.87.orig/src/mlkem768.c dropbear-2025.87/src/mlkem768.c
--- dropbear-2025.87.orig/src/mlkem768.c	2025-03-05 15:30:00.000000000 +0100
+++ dropbear-2025.87/src/mlkem768.c	2025-08-08 20:25:51.746419662 +0200
@@ -60,9 +60,6 @@
 	unsigned char rnd[LIBCRUX_ML_KEM_KEY_PAIR_PRNG_LEN];
 	struct libcrux_mlkem768_keypair keypair;
 
-	static_assert(sizeof(keypair.sk.value) == crypto_kem_mlkem768_SECRETKEYBYTES, "len");
-	static_assert(sizeof(keypair.pk.value) == crypto_kem_mlkem768_PUBLICKEYBYTES, "len");
-
 	genrandom(rnd, sizeof(rnd));
 	keypair = libcrux_ml_kem_mlkem768_portable_generate_key_pair(rnd);
 	memcpy(pk, keypair.pk.value, crypto_kem_mlkem768_PUBLICKEYBYTES);
@@ -80,10 +77,6 @@
 	struct libcrux_mlkem768_enc_result enc;
 	struct libcrux_mlkem768_pk mlkem_pub;
 
-	static_assert(sizeof(mlkem_pub.value) == crypto_kem_mlkem768_PUBLICKEYBYTES, "len");
-	static_assert(sizeof(enc.fst.value) == crypto_kem_mlkem768_CIPHERTEXTBYTES, "len");
-	static_assert(sizeof(enc.snd) == crypto_kem_mlkem768_BYTES, "len");
-
 	memcpy(mlkem_pub.value, pk, crypto_kem_mlkem768_PUBLICKEYBYTES);
 	/* generate and encrypt KEM key with client key */
 	genrandom(rnd, sizeof(rnd));
@@ -103,9 +96,6 @@
 	struct libcrux_mlkem768_sk mlkem_priv;
 	struct libcrux_mlkem768_ciphertext mlkem_ciphertext;
 
-	static_assert(sizeof(mlkem_priv.value) == crypto_kem_mlkem768_SECRETKEYBYTES, "len");
-	static_assert(sizeof(mlkem_ciphertext.value) == crypto_kem_mlkem768_CIPHERTEXTBYTES, "len");
-
 	memcpy(mlkem_priv.value, sk, crypto_kem_mlkem768_SECRETKEYBYTES);
 	memcpy(mlkem_ciphertext.value, c, crypto_kem_mlkem768_CIPHERTEXTBYTES);
 	libcrux_ml_kem_mlkem768_portable_decapsulate(&mlkem_priv,
