summaryrefslogtreecommitdiff
path: root/ui/qt/main_window.h
diff options
context:
space:
mode:
authorGilbert Ramirez <gram@alumni.rice.edu>2016-09-13 22:33:54 -0500
committerAnders Broman <a.broman58@gmail.com>2016-09-15 04:13:59 +0000
commite8e193694a35779eaf506120ecd2567c98f652ac (patch)
treeac0d7dec782f7fee88129700dae81e06dcd9b191 /ui/qt/main_window.h
parentc711bc64573e20e343f343a53ad4d1d50add433d (diff)
downloadwireshark-e8e193694a35779eaf506120ecd2567c98f652ac.tar.gz
Qt: Option to copy bytes to clipboard as Escaped String
Some users need to copy the bytes to a Python script for sending out through a raw socket. While they can modify a plain hex dump, having Wireshark copy directly as a Python string makes their work easier. This format also works with Bash, so it is called "Escaped String". E.g.: "\x55\xb5\xd4\x67\x03" Change-Id: I0b6a5eb2e348f686397afda76095aaa2fb85c18d Reviewed-on: https://code.wireshark.org/review/17696 Petri-Dish: Gilbert Ramirez <gram@alumni.rice.edu> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'ui/qt/main_window.h')
-rw-r--r--ui/qt/main_window.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/ui/qt/main_window.h b/ui/qt/main_window.h
index bc333dc9ec..04832a0e0d 100644
--- a/ui/qt/main_window.h
+++ b/ui/qt/main_window.h
@@ -616,6 +616,7 @@ private slots:
void on_actionContextCopyBytesPrintableText_triggered();
void on_actionContextCopyBytesHexStream_triggered();
void on_actionContextCopyBytesBinary_triggered();
+ void on_actionContextCopyBytesEscapedString_triggered();
void on_actionContextShowPacketBytes_triggered();