Thanks for your help,<br><br>the output of wpa_supplicant is:<br>Reading configuration file '/etc/wpa_supplicant.conf'<br>ctrl_interface='/var/run/wpa<div id="1er8" class="ArwC7c ckChnd">_supplicant'<br>
eapol_version=2<br>Line: 3 - start of a new network block<br>ssid - hexdump_ascii(len=6):<br> 70 72 75 65 62 61 prueba<br>priority=5 (0x5)<br>proto: 0x2<br>key_mgmt: 0x1<br>eap methods - hexdump(len=16): 00 00 00 00 0d 00 00 00 00 00 00 00 00 00 00 00<br>
pairwise: 0x8<br>group: 0x8<br>identity - hexdump_ascii(len=19):<br> 61 6c 69 63 69 61 40 6c 69 62 65 6c 69 75 6d 2e cucu@test.<br> 63 6f 6d com<br>ca_cert - hexdump_ascii(len=19):<br>
2f 65 74 63 2f 63 65 72 74 2f 63 61 6b 65 79 2e /etc/cert/cakey.<br> 70 65 6d pem<br>client_cert - hexdump_ascii(len=46):<br> 2f 68 6f 6d 65 2f 61 6c 69 2f 63 65 72 74 2f 64 <br>
65 6d 6f 43 41 2f 63 65 72 74 73 2f 61 6c 69 63 <br> 69 61 2f 6e 65 77 63 65 72 74 2e 70 65 6d newcert.pem<br>private_key_passwd - hexdump_ascii(len=12): [REMOVED]<br>Priority group 5<br> id=0 ssid='prueba'<br>
Initializing interface (2) 'ath0'<br>Interface ath0 set UP - waiting a second for the driver to complete initialization<br>SIOCGIWRANGE: WE(compiled)=22 WE(source)=13 enc_capa=0xf<br> capabilities: key_mgmt 0xf enc 0xf<br>
WEXT: Operstate: linkmode=1, operstate=5<br>Own MAC address: 00:0b:6b:80:c8:8e<br>wpa_driver_madwifi_del_key: keyidx=0<br>wpa_driver_madwifi_del_key: keyidx=1<br>wpa_driver_madwifi_del_key: keyidx=2<br>wpa_driver_madwifi_del_key: keyidx=3<br>
wpa_driver_madwifi_set_countermeasures: enabled=0<br>wpa_driver_madwifi_set_drop_unencrypted: enabled=1<br>RSN: flushing PMKID list in the driver<br>Setting scan request: 0 sec 100000 usec<br>EAPOL: SUPP_PAE entering state DISCONNECTED<br>
EAPOL: KEY_RX entering state NO_KEY_RECEIVE<br>EAPOL: SUPP_BE entering state INITIALIZE<br>EAP: EAP entering state DISABLED<br>Added interface ath0<br>Ignore event for foreign ifindex 3<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>
RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b06 len=8<br>State: DISCONNECTED -> SCANNING<br>Starting AP scan (broadcast SSID)<br>
Trying to get current scan results first without requesting a new scan to speed up initial association<br>Received 1845 bytes of scan results (8 BSSes)<br>CTRL-EVENT-SCAN-RESULTS<br>Selecting BSS from priority group 5<br>
Try to find WPA-enabled AP<br>0: 00:15:6d:63:a6:45 ssid='prueba' wpa_ie_len=26 rsn_ie_len=24 caps=0x11<br> selected based on RSN IE<br> selected WPA AP 00:15:6d:63:a6:45 ssid='prueba'<br>Try to find non-WPA AP<br>
Trying to associate with 00:15:6d:63:a6:45 (SSID='prueba' freq=2437 MHz)<br>Cancelling scan request<br>WPA: clearing own WPA/RSN IE<br>Automatic auth_alg selection: 0x1<br>RSN: using IEEE 802.11i/D9.0<br>WPA: Selected cipher suites: group 8 pairwise 24 key_mgmt 1 proto 2<br>
WPA: set AP WPA IE - hexdump(len=28): dd 1a 00 50 f2 01 01 00 00 50 f2 02 02 00 00 50 f2 04 00 50 f2 02 01 00 00 50 f2 01<br>WPA: set AP RSN IE - hexdump(len=26): 30 18 01 00 00 0f ac 02 02 00 00 0f ac 04 00 0f ac 02 01 00 00 0f ac 01 00 00<br>
WPA: using GTK TKIP<br>WPA: using PTK TKIP<br>WPA: using KEY_MGMT 802.1X<br>WPA: not using MGMT group cipher<br>WPA: Set own WPA IE default - hexdump(len=22): 30 14 01 00 00 0f ac 02 01 00 00 0f ac 02 01 00 00 0f ac 01 00 00<br>
No keys have been configured - skip key clearing<br>wpa_driver_madwifi_set_drop_unencrypted: enabled=1<br>State: SCANNING -> ASSOCIATING<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>
wpa_driver_madwifi_associate<br>ioctl[IEEE80211_IOCTL_SETMLME]: Invalid argument<br>wpa_driver_madwifi_associate: SETMLME[ASSOC] failed<br>Association request to the driver failed<br>Setting authentication timeout: 5 sec 0 usec<br>
EAPOL: External notification - portControl=Auto<br>RSN: Ignored PMKID candidate without preauth flag<br>RTM_NEWLINK: operstate=0 ifi_flags=0x1003 ([UP])<br>Wireless event: cmd=0x8b1a len=14<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>
Wireless event: cmd=0x8b15 len=20<br>Wireless event: new AP: 00:15:6d:63:a6:45<br>State: ASSOCIATING -> ASSOCIATED<br>wpa_driver_wext_set_operstate: operstate 0->0 (DORMANT)<br>WEXT: Operstate: linkmode=-1, operstate=5<br>
Associated to a new BSS: BSSID=00:15:6d:63:a6:45<br>No keys have been configured - skip key clearing<br>Associated with 00:15:6d:63:a6:45<br>WPA: Association event - clear replay counter<br>EAPOL: External notification - portEnabled=0<br>
EAPOL: External notification - portValid=0<br>EAPOL: External notification - portEnabled=1<br>EAPOL: SUPP_PAE entering state CONNECTING<br>EAPOL: SUPP_BE entering state IDLE<br>EAP: EAP entering state INITIALIZE<br>EAP: EAP entering state IDLE<br>
Setting authentication timeout: 10 sec 0 usec<br>Cancelling scan request<br>RTM_NEWLINK: operstate=0 ifi_flags=0x11003 ([UP][LOWER_UP])<br>RTM_NEWLINK, IFLA_IFNAME: Interface 'ath0' added<br>RX EAPOL from 00:15:6d:63:a6:45<br>
RX EAPOL - hexdump(len=9): 02 00 00 05 01 c6 00 05 01<br>Setting authentication timeout: 70 sec 0 usec<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_PAE entering state RESTART<br>EAP: EAP entering state INITIALIZE<br>
EAP: EAP entering state IDLE<br>EAPOL: SUPP_PAE entering state AUTHENTICATING<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=198 method=1 vendor=0 vendorMethod=0<br>
EAP: EAP entering state IDENTITY<br>CTRL-EVENT-EAP-STARTED EAP authentication started<br>EAP: EAP-Request Identity data - hexdump_ascii(len=0):<br>EAP: using real identity - hexdump_ascii(len=19):<br> 61 6c 69 63 69 61 40 6c 69 62 65 6c 69 75 6d 2e cucu@test.<br>
63 6f 6d com<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL: dst=00:15:6d:63:a6:45<br>
TX EAPOL - hexdump(len=28): 02 00 00 18 02 c6 00 18 01 61 6c 69 63 69 61 40 6c 69 62 65 6c 69 75 6d 2e 63 6f 6d<br>EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:15:6d:63:a6:45<br>RX EAPOL - hexdump(len=10): 02 00 00 06 01 c7 00 06 0d 20<br>
EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Request id=199 method=13 vendor=0 vendorMethod=0<br>EAP: EAP entering state GET_METHOD<br>
EAP: Initialize selected EAP method: vendor 0 method 13 (TLS)<br>EAP-TLS: Private key not configured<br>EAP: Failed to initialize EAP method: vendor 0 method 13 (TLS)<br>EAP: Building EAP-Nak (requested type 13 vendor=0 method=0 not allowed)<br>
EAP: allowed methods - hexdump(len=0):<br>EAP: EAP entering state SEND_RESPONSE<br>EAP: EAP entering state IDLE<br>EAPOL: SUPP_BE entering state RESPONSE<br>EAPOL: txSuppRsp<br>TX EAPOL: dst=00:15:6d:63:a6:45<br>TX EAPOL - hexdump(len=10): 02 00 00 06 02 c7 00 06 03 00<br>
EAPOL: SUPP_BE entering state RECEIVE<br>RX EAPOL from 00:15:6d:63:a6:45<br>RX EAPOL - hexdump(len=8): 02 00 00 04 04 c7 00 04<br>EAPOL: Received EAP-Packet frame<br>EAPOL: SUPP_BE entering state REQUEST<br>EAPOL: getSuppRsp<br>
EAP: EAP entering state RECEIVED<br>EAP: Received EAP-Failure<br>EAP: EAP entering state FAILURE<br>CTRL-EVENT-EAP-FAILURE EAP authentication failed<br>EAPOL: SUPP_PAE entering state HELD<br>EAPOL: SUPP_BE entering state RECEIVE<br>
EAPOL: SUPP_BE entering state FAIL<br>EAPOL: SUPP_BE entering state IDLE<br>EAPOL authentication completed unsuccessfully<br>EAPOL: startWhen --> 0<br>EAPOL: authWhile --> 0<br></div><br>Best regards,<br>