Searched refs:CanQueryAdditionalTypesViaInsecureDns (Results 1 – 7 of 7) sorted by relevance
129 EXPECT_TRUE(client_->CanQueryAdditionalTypesViaInsecureDns()); in TEST_F()167 EXPECT_FALSE(client_->CanQueryAdditionalTypesViaInsecureDns()); in TEST_F()242 EXPECT_TRUE(client_->CanQueryAdditionalTypesViaInsecureDns()); in TEST_F()263 EXPECT_TRUE(client_->CanQueryAdditionalTypesViaInsecureDns()); in TEST_F()273 EXPECT_TRUE(client_->CanQueryAdditionalTypesViaInsecureDns()); in TEST_F()282 EXPECT_TRUE(client_->CanQueryAdditionalTypesViaInsecureDns()); in TEST_F()
52 virtual bool CanQueryAdditionalTypesViaInsecureDns() const = 0;
570 enabled_before && dns_client_->CanQueryAdditionalTypesViaInsecureDns(); in SetInsecureDnsClientEnabled()580 dns_client_->CanQueryAdditionalTypesViaInsecureDns() != in SetInsecureDnsClientEnabled()1308 dns_client_->CanQueryAdditionalTypesViaInsecureDns()); in CreateTaskSequence()1332 dns_client_->CanQueryAdditionalTypesViaInsecureDns()); in CreateTaskSequence()
110 bool CanQueryAdditionalTypesViaInsecureDns() const override { in CanQueryAdditionalTypesViaInsecureDns() function in net::__anon60012f820111::DnsClientImpl
201 client_->CanQueryAdditionalTypesViaInsecureDns()); in StartNextTransaction()264 if (!secure_ && !client_->CanQueryAdditionalTypesViaInsecureDns()) { in MaybeDisableAdditionalQueries()
407 bool CanQueryAdditionalTypesViaInsecureDns() const override;
732 bool MockDnsClient::CanQueryAdditionalTypesViaInsecureDns() const { in CanQueryAdditionalTypesViaInsecureDns() function in net::MockDnsClient