summaryrefslogtreecommitdiff
path: root/ui/qt/main_window.ui
diff options
context:
space:
mode:
authorGilbert Ramirez <gram@alumni.rice.edu>2016-09-13 22:33:54 -0500
committerAnders Broman <a.broman58@gmail.com>2016-09-15 04:13:59 +0000
commite8e193694a35779eaf506120ecd2567c98f652ac (patch)
treeac0d7dec782f7fee88129700dae81e06dcd9b191 /ui/qt/main_window.ui
parentc711bc64573e20e343f343a53ad4d1d50add433d (diff)
downloadwireshark-e8e193694a35779eaf506120ecd2567c98f652ac.tar.gz
Qt: Option to copy bytes to clipboard as Escaped String
Some users need to copy the bytes to a Python script for sending out through a raw socket. While they can modify a plain hex dump, having Wireshark copy directly as a Python string makes their work easier. This format also works with Bash, so it is called "Escaped String". E.g.: "\x55\xb5\xd4\x67\x03" Change-Id: I0b6a5eb2e348f686397afda76095aaa2fb85c18d Reviewed-on: https://code.wireshark.org/review/17696 Petri-Dish: Gilbert Ramirez <gram@alumni.rice.edu> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Anders Broman <a.broman58@gmail.com>
Diffstat (limited to 'ui/qt/main_window.ui')
-rw-r--r--ui/qt/main_window.ui10
1 files changed, 9 insertions, 1 deletions
diff --git a/ui/qt/main_window.ui b/ui/qt/main_window.ui
index 8126d4a35d..bcbfb9e8c5 100644
--- a/ui/qt/main_window.ui
+++ b/ui/qt/main_window.ui
@@ -141,7 +141,7 @@
<x>0</x>
<y>0</y>
<width>960</width>
- <height>22</height>
+ <height>21</height>
</rect>
</property>
<widget class="QMenu" name="menuFile">
@@ -2925,6 +2925,14 @@
<string>Create firewall ACL rules</string>
</property>
</action>
+ <action name="actionContextCopyBytesEscapedString">
+ <property name="text">
+ <string>…as Escaped String</string>
+ </property>
+ <property name="toolTip">
+ <string>Copy packet bytes as a Escaped string</string>
+ </property>
+ </action>
</widget>
<layoutdefault spacing="6" margin="11"/>
<customwidgets>