UPDATE with comparing the debug output from wpa_supplicant:
I have reactivated my old SAMSUNG GALAXY S II with Android 4.1.2. It also connects without any problems. Here are the part of your wpa_supplicant debug output where it differs from mine:
hostapd_logger: STA 6c:c7:ec:4c:3f:f0 - sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=1 ack=1 install=1 pairwise=1 kde_len=28 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) hostapd_logger: STA 6c:c7:ec:4c:3f:f0 - EAPOL-Key timeout WPA: 6c:c7:ec:4c:3f:f0 WPA_PTK entering state PTKINITNEGOTIATING hostapd_logger: STA 6c:c7:ec:4c:3f:f0 - sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=1 ack=1 install=1 pairwise=1 kde_len=28 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 03 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 2) hostapd_logger: STA 6c:c7:ec:4c:3f:f0 - EAPOL-Key timeout WPA: 6c:c7:ec:4c:3f:f0 WPA_PTK entering state PTKINITNEGOTIATING hostapd_logger: STA 6c:c7:ec:4c:3f:f0 - sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=1 ack=1 install=1 pairwise=1 kde_len=28 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 04 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 3) hostapd_logger: STA 6c:c7:ec:4c:3f:f0 - EAPOL-Key timeout WPA: 6c:c7:ec:4c:3f:f0 WPA_PTK entering state PTKINITNEGOTIATING hostapd_logger: STA 6c:c7:ec:4c:3f:f0 - sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=1 ack=1 install=1 pairwise=1 kde_len=28 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 05 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 4) hostapd_logger: STA 6c:c7:ec:4c:3f:f0 - EAPOL-Key timeout WPA: 6c:c7:ec:4c:3f:f0 WPA_PTK entering state PTKINITNEGOTIATING hostapd_logger: STA 6c:c7:ec:4c:3f:f0 - PTKINITNEGOTIATING: Retry limit 4 reached WPA: 6c:c7:ec:4c:3f:f0 WPA_PTK entering state DISCONNECT But from my GALAXY S II it should look like this:
hostapd_logger: STA 98:0c:82:ba:7a:aa - sending 3/4 msg of 4-Way Handshake WPA: Send EAPOL(version=2 secure=0 mic=1 ack=1 install=1 pairwise=1 kde_len=28 keyidx=0 encr=0) WPA: Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: Use EAPOL-Key timeout of 1000 ms (retry counter 1) l2_packet_receive: src=98:0c:82:ba:7a:aa len=99 wlan0: RX EAPOL from 98:0c:82:ba:7a:aa IEEE 802.1X: 99 bytes from 98:0c:82:ba:7a:aa IEEE 802.1X: version=1 type=3 length=95 WPA: Received EAPOL-Key from 98:0c:82:ba:7a:aa key_info=0x10a type=254 mic_len=16 key_data_length=0 WPA: Received Key Nonce - hexdump(len=32): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 WPA: Received Replay Counter - hexdump(len=8): 00 00 00 00 00 00 00 02 hostapd_logger: STA 98:0c:82:ba:7a:aa - received EAPOL-Key frame (4/4 Pairwise) WPA: EAPOL-Key MIC using HMAC-SHA1 WPA: 98:0c:82:ba:7a:aa WPA_PTK entering state PTKINITDONE Until step 3 of the 4-Way Handshake there is no difference but then receiving an EAPOL-Key timed out on your RasPi. It retried 4 times and then entered state DISCONNECT, never reaching state PTKINITDONE. Timeout is set to 1000 ms. I have looked at /usr/share/doc/wpa_supplicant/examples/wpa_supplicant.conf and asked google if there is a way to increase this timeout without success. All what I have found was that this could be a driver problem so an idea was to use the older wext driver but this doesn't support AP mode (mode=2). I don't really belief it's a hardware or firmware problem. I guess it is an issue with an app or driver that you only run on your android devices. Have a look at it.