Merge "[rdkb][hal] fix dmcli set password fail issue in wpa3psk mode"
diff --git a/src/logan_wifi/wifi_hal.c b/src/logan_wifi/wifi_hal.c
index bb65d56..8954aef 100644
--- a/src/logan_wifi/wifi_hal.c
+++ b/src/logan_wifi/wifi_hal.c
@@ -21556,7 +21556,8 @@
 	wifi_setDisable_EAPOL_retries(ap_index, disable_EAPOL_retries);
 
 	if (security->mode != wifi_security_mode_none && security->mode != wifi_security_mode_enhanced_open) {
-		if (security->u.key.type == wifi_security_key_type_psk || security->u.key.type == wifi_security_key_type_pass || security->u.key.type == wifi_security_key_type_psk_sae) {
+		if (security->u.key.type == wifi_security_key_type_psk || security->u.key.type == wifi_security_key_type_pass
+		|| security->u.key.type == wifi_security_key_type_sae || security->u.key.type == wifi_security_key_type_psk_sae) {
 			int key_len = strlen(security->u.key.key);
 			// wpa_psk and wpa_passphrase cann;t use at the same time, the command replace one with the other.
 			if (key_len == 64) {	// set wpa_psk
@@ -21606,6 +21607,11 @@
 			params.value = "TKIP CCMP";
 		wifi_hostapdWrite(config_file, &params, 1);
 		wifi_hostapdProcessUpdate(ap_index, &params, 1);
+
+		/* rsn_pairwise need to be updated too */
+		params.name = "rsn_pairwise";
+		wifi_hostapdWrite(config_file, &params, 1);
+		wifi_hostapdProcessUpdate(ap_index, &params, 1);
 	}
 
 	if (security->mfp == wifi_mfp_cfg_disabled){