| Index: sandbox/win/src/sandbox_policy.h | 
| diff --git a/sandbox/win/src/sandbox_policy.h b/sandbox/win/src/sandbox_policy.h | 
| index c1af8578866c00981636d7b0b271d176133c7ceb..95db0c19224fdae8659e03609550613216bb5c4f 100644 | 
| --- a/sandbox/win/src/sandbox_policy.h | 
| +++ b/sandbox/win/src/sandbox_policy.h | 
| @@ -46,17 +46,17 @@ class TargetPolicy { | 
| // over the resulting process and thread handles. | 
| // No other parameters besides the command line are | 
| // passed to the child process. | 
| -    PROCESS_ALL_EXEC,      // Allows the creation of a process and return fill | 
| +    PROCESS_ALL_EXEC,      // Allows the creation of a process and return full | 
| // access on the returned handles. | 
| // This flag can be used only when the main token of | 
| // the sandboxed application is at least INTERACTIVE. | 
| EVENTS_ALLOW_ANY,      // Allows the creation of an event with full access. | 
| -    EVENTS_ALLOW_READONLY, // Allows opening an even with synchronize access. | 
| -    REG_ALLOW_READONLY,    // Allows readonly access to a registry key. | 
| -    REG_ALLOW_ANY,         // Allows read and write access to a registry key. | 
| -    FAKE_USER_GDI_INIT     // Fakes user32 and gdi32 initialization. This can | 
| -                           // be used to allow the DLLs to load and initialize | 
| -                           // even if the process cannot access that subsystem. | 
| +    EVENTS_ALLOW_READONLY,  // Allows opening an even with synchronize access. | 
| +    REG_ALLOW_READONLY,     // Allows readonly access to a registry key. | 
| +    REG_ALLOW_ANY,          // Allows read and write access to a registry key. | 
| +    FAKE_USER_GDI_INIT      // Fakes user32 and gdi32 initialization. This can | 
| +                            // be used to allow the DLLs to load and initialize | 
| +                            // even if the process cannot access that subsystem. | 
| }; | 
|  | 
| // Increments the reference count of this object. The reference count must | 
|  |