Describe the bug
Running the brcm43455 in AP mode (hostapd 2.11) using latest firmware (7.45.286) in WPA3 mode (SAE authentication) succeeds on some clients but fails on others. The problem is a how RSNE packets are advertised. In WPA3, group management cipher is mandatory. The RSNE simply advertises PMF in capabilities correctly (00 cc) but stops there and omits Group Management Cipher Count (00 01) and Cipher Descriptor (00 0f ac 06 for BIP-CMAC-128). New clients simply consider such behavior non-compliant.
Steps to reproduce the behaviour
Force WPA3-only
...
wpa_authentication=SAE
sae_pwd=1
ieee80211w=2
transition_disable=1
...
Device (s)
Raspberry Pi 4 Mod. B
System
Kernel version 6.18.28
Logs
No response
Additional context
No response
Describe the bug
Running the brcm43455 in AP mode (hostapd 2.11) using latest firmware (7.45.286) in WPA3 mode (SAE authentication) succeeds on some clients but fails on others. The problem is a how RSNE packets are advertised. In WPA3, group management cipher is mandatory. The RSNE simply advertises PMF in capabilities correctly (00 cc) but stops there and omits Group Management Cipher Count (00 01) and Cipher Descriptor (00 0f ac 06 for BIP-CMAC-128). New clients simply consider such behavior non-compliant.
Steps to reproduce the behaviour
Force WPA3-only
...
wpa_authentication=SAE
sae_pwd=1
ieee80211w=2
transition_disable=1
...
Device (s)
Raspberry Pi 4 Mod. B
System
Kernel version 6.18.28
Logs
No response
Additional context
No response