Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
index f47a186a098cf937f290461cd67fb7db55c6580a..d5bda8e518a23ed6c9c103283e699aaea641d1d9 100644 |
--- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
+++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
@@ -327,8 +327,7 @@ void PhishingDOMFeatureExtractor::HandleInput( |
// Note that we use the attribute value rather than |
// WebFormControlElement::formControlType() for consistency with the |
// way the phishing classification model is created. |
- std::string type = element.getAttribute("type").utf8(); |
- base::StringToLowerASCII(&type); |
+ std::string type = base::ToLowerASCII(element.getAttribute("type").utf8()); |
if (type == "password") { |
++page_feature_state_->num_pswd_inputs; |
} else if (type == "radio") { |