Hello,
Actually, i got it working.
I thought that when an administrator log into a switch that was configured for Radius authentication, the switch sent an MD5-encrypted password to the Radius server, but it's not true.
As described in
http://freeradius.org/rfc/rfc2865.html#User-Password, actually the switch makes a MD5 hash of the shared secret + "authenticator" radius attribute, and then it XORes this with the password. And it sends this result to the Radius server.
On the Radius side, the Radius server knows the shared secret, the authenticator attribute (it is sent in the Radius message), so it can make the reverse operation : MD5 hash of (shared secret + authenticator) + XOR with the encrypted password, and therefore it finds the clear-text password of the administrator.
Once the Radius server has the cleartext password, it can encrypt it again in any form (NT hash, MD5 hash, Unix Crypt...) depending on how passwords are encrypted in the database (LDAP or AD server for example)
I couldn't get this to work just because i hade made mistakes in my Freeradius configuration files, it had nothing to do with encryption problems
Thanks again guys for your help
Gabriel