AES_KEYSIZE_192
if (key_len == AES_KEYSIZE_192) {
key_len != AES_KEYSIZE_192 &&
case AES_KEYSIZE_192:
ppc_expand_key_192(ctx->key_twk, in_key + AES_KEYSIZE_192);
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
if (keylen != AES_KEYSIZE_256 && keylen != AES_KEYSIZE_192 &&
case AES_KEYSIZE_192:
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
keylen != AES_KEYSIZE_192 &&
keylen != AES_KEYSIZE_192 &&
else if (keylen == AES_KEYSIZE_192)
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
(aes->key_len == AES_KEYSIZE_192) ||
(aes->key_len == AES_KEYSIZE_192) ||
(aes->key_len == AES_KEYSIZE_192) ||
ctx->auth_keylen != AES_KEYSIZE_192 &&
ctx->enc_keylen != AES_KEYSIZE_192 &&
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
} else if (keylen == AES_KEYSIZE_192) {
} else if (keylen == AES_KEYSIZE_192) {
} else if (keys.enckeylen == AES_KEYSIZE_192) {
} else if (keys.enckeylen == AES_KEYSIZE_192) {
else if (keylen == AES_KEYSIZE_192)
if (len != AES_KEYSIZE_192 && len != AES_KEYSIZE_256)
if (len != AES_KEYSIZE_192 && len != AES_KEYSIZE_256)
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
AES_KEYSIZE_192;
if (len == AES_KEYSIZE_192)
case AES_KEYSIZE_192:
if (len == AES_KEYSIZE_192) {
if (len == AES_KEYSIZE_192) {
case AES_KEYSIZE_192:
if (keylen >> 1 == AES_KEYSIZE_192) {
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192 + AES_GCM_SALT_SIZE:
ctx->enc_key_len = AES_KEYSIZE_192;
case 2 * AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192 + AES_GCM_SALT_SIZE:
ctx->enc_key_len = AES_KEYSIZE_192;
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_256 && keylen != AES_KEYSIZE_192)
if (keylen == AES_KEYSIZE_192)
authenc_keys.enckeylen != AES_KEYSIZE_192 &&
if (authenc_keys.enckeylen == AES_KEYSIZE_192)
case AES_KEYSIZE_192:
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
if (ctx->keylen == AES_KEYSIZE_192)
else if (keylen == AES_KEYSIZE_192)
if (dev->ctx->keylen == AES_KEYSIZE_192)
keylen != AES_KEYSIZE_192 &&
if (key_sz == AES_KEYSIZE_192) {
case AES_KEYSIZE_192:
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
if (keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256)
if (ctx->keylen >= AES_KEYSIZE_192) {
case AES_KEYSIZE_192:
keylen != AES_KEYSIZE_192 &&
keylen != AES_KEYSIZE_192 &&
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 &&
case AES_KEYSIZE_192:
if (keylen == AES_KEYSIZE_128 || keylen == AES_KEYSIZE_192 ||
case AES_KEYSIZE_192:
case AES_KEYSIZE_192:
if (keylen != AES_KEYSIZE_128 && keylen != AES_KEYSIZE_192 && keylen != AES_KEYSIZE_256)
keylen != 2 * AES_KEYSIZE_192 &&
else if (ctx->keylen == AES_KEYSIZE_192)
case AES_KEYSIZE_192:
tfm_ctx->keylen == AES_KEYSIZE_192)
if (tfm_ctx->keylen == AES_KEYSIZE_192)
} else if (keylen == AES_KEYSIZE_192) {
case AES_KEYSIZE_192:
if (key_len == AES_KEYSIZE_192) {
if (key_len == AES_KEYSIZE_192) {
else if (key_len == AES_KEYSIZE_192)
} else if (key_len == AES_KEYSIZE_192) {
memcpy(k->raw_key, in_key, AES_KEYSIZE_192);
} else if (key->len == AES_KEYSIZE_192) {
else if (key->len == AES_KEYSIZE_192)
else if (key->len == AES_KEYSIZE_192)
if (static_branch_likely(&have_aes) && key_len != AES_KEYSIZE_192 &&