diff --git a/Sandboxie/core/dll/dllhook.c b/Sandboxie/core/dll/dllhook.c index c8592366..06f32069 100644 --- a/Sandboxie/core/dll/dllhook.c +++ b/Sandboxie/core/dll/dllhook.c @@ -1115,7 +1115,7 @@ void* SbieDll_Hook_arm( #endif // - // write branche to jump entry + // write branch to jump entry // diff = (ULONG_PTR) & ((ULONG_PTR*)ptrVTable->offset)[ptrVTable->index]; diff --git a/Sandboxie/core/dll/file_del.c b/Sandboxie/core/dll/file_del.c index f03c2f98..45097ac6 100644 --- a/Sandboxie/core/dll/file_del.c +++ b/Sandboxie/core/dll/file_del.c @@ -628,7 +628,7 @@ _FX BOOLEAN File_InitDelete_v2() _FX BOOLEAN File_MarkDeleted_internal(LIST* Root, const WCHAR* Path) { - // 1. remove deleted branche + // 1. remove deleted branch LIST* Parent = NULL; PATH_NODE* Node = File_FindPathBranche_internal(Root, Path, &Parent, FALSE); @@ -722,7 +722,7 @@ _FX BOOLEAN File_HasDeleted_v2(const WCHAR* TruePath) _FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const WCHAR *NewTruePath) { - // 1. separate branche from OldTruePath + // 1. separate branch from OldTruePath LIST* Parent = NULL; PATH_NODE* Node = File_FindPathBranche_internal(Root, OldTruePath, &Parent, FALSE); @@ -762,7 +762,7 @@ _FX VOID File_SetRelocation_internal(LIST* Root, const WCHAR *OldTruePath, const wcscpy(NewNode->relocation, OldTruePath); - // 5. reatach branche to NewTruePath + // 5. reatach branch to NewTruePath if (Node) { PATH_NODE* child = List_Head(&Node->items); diff --git a/Sandboxie/core/drv/file.c b/Sandboxie/core/drv/file.c index 73dcb998..0e211e2f 100644 --- a/Sandboxie/core/drv/file.c +++ b/Sandboxie/core/drv/file.c @@ -2277,7 +2277,7 @@ _FX NTSTATUS File_Api_RefreshPathList(PROCESS *proc, ULONG64 *parms) } else { // - // on failure purge the partialy cerated new set of path lists + // on failure purge the partially created new set of path lists // #ifdef USE_MATCH_PATH_EX diff --git a/Sandboxie/core/drv/process_low.c b/Sandboxie/core/drv/process_low.c index 97aeded7..40851ce2 100644 --- a/Sandboxie/core/drv/process_low.c +++ b/Sandboxie/core/drv/process_low.c @@ -264,7 +264,7 @@ _FX NTSTATUS Process_Low_Api_InjectComplete(PROCESS *proc, ULONG64 *parms) // // the service synamically allocates a per box SID to be used, - // if no SID is provided thsi feature is eider disabled or failed + // if no SID is provided this feature is eider disabled or failed // then we fall back to using the default anonymous SID // @@ -287,7 +287,7 @@ _FX NTSTATUS Process_Low_Api_InjectComplete(PROCESS *proc, ULONG64 *parms) // // the service tells us if we should drop admin rights for this process, - // howeever if security mode is enabled we always drop admin rights + // however if security mode is enabled we always drop admin rights // proc->drop_rights = proc->use_security_mode || parms[3] != FALSE; diff --git a/Sandboxie/core/low/init.c b/Sandboxie/core/low/init.c index 09711ec2..f4e58391 100644 --- a/Sandboxie/core/low/init.c +++ b/Sandboxie/core/low/init.c @@ -190,7 +190,7 @@ _FX NTSTATUS SbieApi_DebugError(SBIELOW_DATA* data, ULONG error) wchar_t text[] = { 'L','o','w','L','e','v','e','l',' ','E','r','r','o','r',':',' ','0','x',0,0,0,0,0,0,0,0,0,0}; - // covert ulong to hex string and copy it into the message array + // convert ulong to hex string and copy it into the message array wchar_t* ptr = &text[18]; // point after L"...0x" wchar_t table[] = { '0','1','2','3','4','5','6','7','8','9','A','B','C','D','E','F' }; for(int i=28; i >= 0; i-=4) diff --git a/Sandboxie/core/svc/main.cpp b/Sandboxie/core/svc/main.cpp index 7c9b2a0a..21c3dbad 100644 --- a/Sandboxie/core/svc/main.cpp +++ b/Sandboxie/core/svc/main.cpp @@ -515,7 +515,7 @@ finish: bool CheckDropRights(const WCHAR *BoxName, const WCHAR *ExeName) { - // Allow setting of DropAdminRights to supress UAC prompts / elevation from the sandboxed realm + // Allow setting of DropAdminRights to suppress UAC prompts / elevation from the sandboxed realm //if (SbieApi_QueryConfBool(BoxName, L"NoSecurityIsolation", FALSE)) // return false; // if we are not swapping the token we can not drop admin rights so keep this consistent if (SbieApi_QueryConfBool(BoxName, L"UseSecurityMode", FALSE))