You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I collected packets on an Atmel samr21-xpro via RIOT firmware and sniffer [1]. I was able to see packets in Wireshark with openwsn-dissetors, from an OpenMote running openwsn-fw. However, the packets are listed as malformed. See the attached zipped pcap riot-sniffer.zip.
In Wireshark, the problem looks like the absence of the 802.15.4 FCS bytes in RIOT's capture. However, the capture file uses the format LINKTYPE_IEEE802_15_4_NOFCS (230). Also, the packets are dissected without the malformed tag in stock Wireshark.
Perhaps the problem is the fix [2] for issue #7, which changes dissect_ieee802154_nofcs() to use tvb_captured_length() rather than tvb_reported_length().
I collected packets on an Atmel samr21-xpro via RIOT firmware and sniffer [1]. I was able to see packets in Wireshark with openwsn-dissetors, from an OpenMote running openwsn-fw. However, the packets are listed as malformed. See the attached zipped pcap riot-sniffer.zip.
In Wireshark, the problem looks like the absence of the 802.15.4 FCS bytes in RIOT's capture. However, the capture file uses the format LINKTYPE_IEEE802_15_4_NOFCS (230). Also, the packets are dissected without the malformed tag in stock Wireshark.
Perhaps the problem is the fix [2] for issue #7, which changes dissect_ieee802154_nofcs() to use tvb_captured_length() rather than tvb_reported_length().
[1] https://github.com/RIOT-OS/RIOT/tree/master/dist/tools/sniffer
[2] 7f9b9b5
The text was updated successfully, but these errors were encountered: