Index: chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
diff --git a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
index 0be384edc30d3759171312ad3c15a8d179e01d8b..9823c8c02dea2a4bfe5bf81167b702cdffbd8066 100644 |
--- a/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
+++ b/chrome/renderer/safe_browsing/phishing_dom_feature_extractor.cc |
@@ -386,8 +386,9 @@ void PhishingDOMFeatureExtractor::ResetFrameData() { |
cur_frame_data_.reset(new FrameData()); |
cur_frame_data_->elements = cur_document_.all(); |
cur_frame_data_->domain = |
- net::RegistryControlledDomainService::GetDomainAndRegistry( |
- cur_document_.url()); |
+ net::registry_controlled_domains::GetDomainAndRegistry( |
+ cur_document_.url(), |
+ net::registry_controlled_domains::EXCLUDE_PRIVATE_REGISTRIES); |
} |
WebKit::WebDocument PhishingDOMFeatureExtractor::GetNextDocument() { |
@@ -422,8 +423,8 @@ bool PhishingDOMFeatureExtractor::IsExternalDomain(const GURL& url, |
if (url.HostIsIPAddress()) { |
domain->assign(url.host()); |
} else { |
- domain->assign(net::RegistryControlledDomainService::GetDomainAndRegistry( |
- url)); |
+ domain->assign(net::registry_controlled_domains::GetDomainAndRegistry( |
+ url, net::registry_controlled_domains::EXCLUDE_PRIVATE_REGISTRIES)); |
} |
return !domain->empty() && *domain != cur_frame_data_->domain; |