Access functions for the GPIOC peripheral instance
Reset values for each field in GPIOC
Release exclusive access to GPIOC
Unsafely steal GPIOC
Safe access to GPIOC