diff options
author | Gilbert Ramirez <gram@alumni.rice.edu> | 2016-09-13 22:33:54 -0500 |
---|---|---|
committer | Anders Broman <a.broman58@gmail.com> | 2016-09-15 04:13:59 +0000 |
commit | e8e193694a35779eaf506120ecd2567c98f652ac (patch) | |
tree | ac0d7dec782f7fee88129700dae81e06dcd9b191 /ui/qt/main_window.ui | |
parent | c711bc64573e20e343f343a53ad4d1d50add433d (diff) | |
download | wireshark-e8e193694a35779eaf506120ecd2567c98f652ac.tar.gz |
Qt: Option to copy bytes to clipboard as Escaped String
Some users need to copy the bytes to a Python script for
sending out through a raw socket. While they can modify a
plain hex dump, having Wireshark copy directly as a Python
string makes their work easier. This format also works
with Bash, so it is called "Escaped String". E.g.:
"\x55\xb5\xd4\x67\x03"
Change-Id: I0b6a5eb2e348f686397afda76095aaa2fb85c18d
Reviewed-on: https://code.wireshark.org/review/17696
Petri-Dish: Gilbert Ramirez <gram@alumni.rice.edu>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org>
Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'ui/qt/main_window.ui')
-rw-r--r-- | ui/qt/main_window.ui | 10 |
1 files changed, 9 insertions, 1 deletions
diff --git a/ui/qt/main_window.ui b/ui/qt/main_window.ui index 8126d4a35d..bcbfb9e8c5 100644 --- a/ui/qt/main_window.ui +++ b/ui/qt/main_window.ui @@ -141,7 +141,7 @@ <x>0</x> <y>0</y> <width>960</width> - <height>22</height> + <height>21</height> </rect> </property> <widget class="QMenu" name="menuFile"> @@ -2925,6 +2925,14 @@ <string>Create firewall ACL rules</string> </property> </action> + <action name="actionContextCopyBytesEscapedString"> + <property name="text"> + <string>…as Escaped String</string> + </property> + <property name="toolTip"> + <string>Copy packet bytes as a Escaped string</string> + </property> + </action> </widget> <layoutdefault spacing="6" margin="11"/> <customwidgets> |