Searched refs:enable (Results 1 – 9 of 9) sorted by relevance
303 bool enable; in write_sriov_cap_reg() local305 enable = ((val & PCIM_SRIOV_VF_ENABLE) != 0U); in write_sriov_cap_reg()306 if (enable != is_vf_enabled(vdev)) { in write_sriov_cap_reg()307 if (enable) { in write_sriov_cap_reg()
41 static inline void enable_disable_msi(const struct pci_vdev *vdev, bool enable) in enable_disable_msi() argument47 if (enable) { in enable_disable_msi()
125 if (cfg_addr.bits.enable != 0U) { in vpci_pio_cfgdata_read()156 if (cfg_addr.bits.enable != 0U) { in vpci_pio_cfgdata_write()
39 uint32_t enable:1; member
79 return (vmtrr->def_type.bits.enable != 0U); in is_mtrr_enabled()107 vmtrr->def_type.bits.enable = 1U; in init_vmtrr()
164 uint32_t enable : 1; /* BITs 31, Enable bit */ member
369 void enable_disable_pci_intx(union pci_bdf bdf, bool enable);
312 void enable_disable_pci_intx(union pci_bdf bdf, bool enable) in enable_disable_pci_intx() argument318 if (enable) { in enable_disable_pci_intx()
295 prior versions of Mbed TLS. To restore the old behavior, enable617 * Fix conditional preprocessor directives in bignum.h to enable 64-bit620 encoded X.509 CRLs. The overflow could enable maliciously constructed CRLs624 encoded X.509 CSRs. The overflow could enable maliciously constructed CSRs628 encoded X.509 certificates. The overflow could enable maliciously711 This involved exposing parts of the internal interface to enable714 * Add a new configuration option to 'mbedtls_ssl_config' to enable1191 place of mbedtls_ssl_conf_session_tickets() to enable session tickets.1883 * Ability to enable / disable SSL v3 / TLS 1.0 / TLS 1.1 / TLS 1.22464 enable and disable individual modes when needed[all …]
Completed in 19 milliseconds