Comments (5)
Is it possible to set baudrate on the Sniffer side to one of [230400, 403200, 460800, 806400, 921600, 1500000, 3000000, 128000, 134400, 161280, 201600, 230400, 268800, 403200, 460800, 614400, 806400, 921600, 1228800, 2457600, 3000000, 6000000, 12000000]
just to verify if the problem is related with baudrate rejection by kernel driver?
from nrf-sniffer-for-802.15.4.
Can you please specify exact port parameters on the Sniffer firmware side?
from nrf-sniffer-for-802.15.4.
Thank you for sharing your experience with running 802.15.4 Sniffer on FreeBSD.
I have managed to flash HEX into the DONGLE using
nrftool
and some blind DFU ZIP conversion. Can this be the cause of problem?
I have no experience with flashing the dongle using nrftool
. I've flashed mine using nRF Connect for Desktop. As long as the hex file is correctly stored in the dongle memory, I think the tool used to flash makes no difference. However, to make sure, I would recommend to try flashing the dongle using a PC running one of operating systems supported by nRF Connect for Desktop and use it with Wireshark running in FreeBSD. When you manage to run this combination, you could try flashing in FreeBSD itself and verify if everything works as expected.
Is there any way I can talk to the DONGLE Sniffer over MiniCom (serial terminal application) in order to verify its operations?
Yes. You can use a serial terminal like minicom, screen, putty, etc and connect to the sniffer device. It exposes a text command line interface. You can try typing a command channel
followed by a newline character (enter key). The CLI interface is supposed to echo each character you type and report the default channel (11
) after you use this command.
Is there any python script that could veryfy operations of a Sniffer on a given port (
/dev/cuaU0
in my case)?
The python module compatible with the sniffer command line interface is included in this repository: https://github.com/NordicSemiconductor/nRF-Sniffer-for-802.15.4/blob/master/nrf802154_sniffer/nrf802154_sniffer.py . It can be used like Wireshark extcap process (command line options compatible with extcap interface), or imported in other python programs.
Can you please specify exact port parameters on the Sniffer firmware side?
The sniffer uses USB CDC as a serial transport. It does not use UART. Because of that it is not needed to select baud rate or any other UART parameter when connecting to the device.
from nrf-sniffer-for-802.15.4.
Allright I will find another machine to run nRF Connect to compare the results and will report back but ultimately the nrftool
is the only supported utility on my platform and I would like to keep everything in one place I am sure this is possible to achieve, thanks for the hints @hubertmis :-)
from nrf-sniffer-for-802.15.4.
- Using the same setup I was able to convert 802.15.4 Sniffer HEX to DFU ZIP and flash it onto the nRF52840 DONGLE.
- I can talk to 802.15.4 Snifferover minicom serial terminal no matter what port speed. I can see a nice menu unlike the BLE Sniffer which does not respond at all.
- True it is not a hardware UART speed does not matter.
- I can confirm with 802.15.4 firmware, this seems to be a problem with BLE Sniffer firmware.
Technically speaking this case is solved for 802.15.4 Sniffer so I will close the ticket. Thank you @hubertmis :-)
Now I just need to get Wireshark excap find that 802.15.4 Sniffer :-)
from nrf-sniffer-for-802.15.4.
Related Issues (20)
- LED indicators need to be described in readme.md HOT 1
- Remove DFU Trigger Library from the firmware HOT 5
- nRF52840-DK not recognized HOT 1
- Missing packets using the nRF52840 Dongle HOT 1
- Channel always goes to 11 after a reset in Wireshark with no way to change. HOT 3
- Could not Capture from multiple hardware interfaces on Windows HOT 1
- [question] 802.15.4 capabilities HOT 3
- Segfault on capture start Wireshark 3.2.0 HOT 2
- Q: Is the source code for the hex files available? HOT 14
- nRF52840 DONGLE DFU ZIP HOT 7
- Startup time is too long when start capturing packets HOT 2
- sniffer not support xiaomi phone's BLE packet HOT 1
- Firmware for other devkits, PCA10100
- Linux, Python, error after channel switching HOT 1
- nRF5340 DK support? HOT 1
- nRF52840 support for tshark? HOT 2
- nrf802154_sniffer.py doesn't exit on macOS when the capture is stopped HOT 8
- Cannot capture on a custom board with external JLINK! HOT 1
- `SyntaxWarning: invalid escape sequence '\s'` when compiling RCV_REGEX HOT 1
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from nrf-sniffer-for-802.15.4.