Index: chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc |
diff --git a/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc b/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc |
index 6edafbf83893459332cea7ecfd81ec4c9e2e9398..b15549ecf4722e48abffcdcb3c5fa92d10d0a9ea 100644 |
--- a/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc |
+++ b/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer_win_unittest.cc |
@@ -44,7 +44,7 @@ TEST(BlacklistLoadAnalyzer, TestBlacklistBypass) { |
EXPECT_TRUE(GetLoadedBlacklistedModules(&module_names)); |
ASSERT_EQ(1, module_names.size()); |
EXPECT_STREQ(kTestDllName, |
- base::StringToLowerASCII( |
+ base::ToLowerASCII( |
base::FilePath(module_names[0]).BaseName().value()).c_str()); |
} |