| Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc
|
| diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc
|
| index 0be384edc30d3759171312ad3c15a8d179e01d8b..9823c8c02dea2a4bfe5bf81167b702cdffbd8066 100644
|
| --- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc
|
| +++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc
|
| @@ -386,8 +386,9 @@ void PhishingDOMFeatureExtractor::ResetFrameData() {
|
| cur_frame_data_.reset(new FrameData());
|
| cur_frame_data_->elements = cur_document_.all();
|
| cur_frame_data_->domain =
|
| - net::RegistryControlledDomainService::GetDomainAndRegistry(
|
| - cur_document_.url());
|
| + net::registry_controlled_domains::GetDomainAndRegistry(
|
| + cur_document_.url(),
|
| + net::registry_controlled_domains::EXCLUDE_PRIVATE_REGISTRIES);
|
| }
|
|
|
| WebKit::WebDocument PhishingDOMFeatureExtractor::GetNextDocument() {
|
| @@ -422,8 +423,8 @@ bool PhishingDOMFeatureExtractor::IsExternalDomain(const GURL& url,
|
| if (url.HostIsIPAddress()) {
|
| domain->assign(url.host());
|
| } else {
|
| - domain->assign(net::RegistryControlledDomainService::GetDomainAndRegistry(
|
| - url));
|
| + domain->assign(net::registry_controlled_domains::GetDomainAndRegistry(
|
| + url, net::registry_controlled_domains::EXCLUDE_PRIVATE_REGISTRIES));
|
| }
|
|
|
| return !domain->empty() && *domain != cur_frame_data_->domain;
|
|
|