I collected packets on an Atmel samr21-xpro via RIOT firmware and sniffer [1]. I was able to see packets in Wireshark with openwsn-dissetors, from an OpenMote running openwsn-fw. However, the packets are listed as malformed. See the attached zipped pcap riot-sniffer.zip.
In Wireshark, the problem looks like the absence of the 802.15.4 FCS bytes in RIOT's capture. However, the capture file uses the format LINKTYPE_IEEE802_15_4_NOFCS (230). Also, the packets are dissected without the malformed tag in stock Wireshark.
Perhaps the problem is the fix [2] for issue #7, which changes dissect_ieee802154_nofcs() to use tvb_captured_length() rather than tvb_reported_length().
I collected packets on an Atmel samr21-xpro via RIOT firmware and sniffer [1]. I was able to see packets in Wireshark with openwsn-dissetors, from an OpenMote running openwsn-fw. However, the packets are listed as malformed. See the attached zipped pcap riot-sniffer.zip.
In Wireshark, the problem looks like the absence of the 802.15.4 FCS bytes in RIOT's capture. However, the capture file uses the format LINKTYPE_IEEE802_15_4_NOFCS (230). Also, the packets are dissected without the malformed tag in stock Wireshark.
Perhaps the problem is the fix [2] for issue #7, which changes dissect_ieee802154_nofcs() to use tvb_captured_length() rather than tvb_reported_length().
[1] https://github.com/RIOT-OS/RIOT/tree/master/dist/tools/sniffer [2] https://github.com/openwsn-berkeley/dissectors/commit/7f9b9b5d5dd94dd2181ecebaf87a04f27a9ac9c7