FreeRadius Can't accept a packet that
 issused from IAS
 The packet is Access-Request
. It content a EAP message
 I have no idea where is the problem

The below is what I have experiment
 include Source code , packet content
pls , give me a help



When present in an Access-Request packet,
Message-Authenticator is an HMAC-MD5 [9] checksum of
the entire Access-Request packet,including Type, ID,
Length and authenticator, using the shared secret as
the key, as follows.
Message-Authenticator = HMAC-MD5 (Type, Identifier,
Length,Request Authenticator, Attributes)

But I got a Radius-Access-Request by Network Monitor
I found that I use HMAC-MD5 to calculate The
Radius-Packet for having Message-Authenticator
My Message-Authenticator is different with another
Messgae-Authenticator of Radius-Access-Request from
IAS 
I don't know the reason ???
Who can help me ????
Help help help .....
The secret key : chenwei
The attached file could running under Borland C++
Builder
The attached file is result of parser for
Radius-Access-Request 
Help me ...

1 35.280731 TELESY310868 LOCAL RADIUS Message Type:
Access Request(1) 192.168.168.95 802-1X IP 
Frame: Base frame properties
    Frame: Time of capture = 1/2/2002 0:41:41.431
    Frame: Time delta from previous physical frame: 0
microseconds
    Frame: Frame number: 1
    Frame: Total frame length: 185 bytes
    Frame: Capture frame length: 185 bytes
    Frame: Frame data: Number of data bytes remaining
= 185 (0x00B9)
ETHERNET: ETYPE = 0x0800 : Protocol = IP:  DOD
Internet Protocol
    ETHERNET: Destination address : 00502200195F
        ETHERNET: .......0 = Individual address
        ETHERNET: ......0. = Universally administered
address
    ETHERNET: Source address : 004096310868
        ETHERNET: .......0 = No routing information
present
        ETHERNET: ......0. = Universally administered
address
    ETHERNET: Frame Length : 185 (0x00B9)
    ETHERNET: Ethernet Type : 0x0800 (IP:  DOD
Internet Protocol)
    ETHERNET: Ethernet Data: Number of data bytes
remaining = 171 (0x00AB)
IP: ID = 0x1E96; Proto = UDP; Len: 171
    IP: Version = 4 (0x4)
    IP: Header Length = 20 (0x14)
    IP: Precedence = Routine
    IP: Type of Service = Normal Service
    IP: Total Length = 171 (0xAB)
    IP: Identification = 7830 (0x1E96)
    IP: Flags Summary = 0 (0x0)
        IP: .......0 = Last fragment in datagram
        IP: ......0. = May fragment datagram if
necessary
    IP: Fragment Offset = 0 (0x0) bytes
    IP: Time to Live = 64 (0x40)
    IP: Protocol = UDP - User Datagram
    IP: Checksum = 0x891F
    IP: Source Address = 192.168.168.95
    IP: Destination Address = 192.168.168.220
    IP: Data: Number of data bytes remaining = 151
(0x0097)
UDP: Src Port: Unknown, (1846); Dst Port: Unknown
(1645); Length = 151 (0x97)
    UDP: Source Port = 0x0736
    UDP: Destination Port = 0x066D
    UDP: Total length = 151 (0x97) bytes
    UDP: UDP Checksum = 0x7B6A
    UDP: Data: Number of data bytes remaining = 143
(0x008F)
RADIUS: Message Type: Access Request(1)
    RADIUS: Message Type = Access Request
    RADIUS: Identifier = 54 (0x36)
    RADIUS: Length = 143 (0x8F)
    RADIUS: Authenticator = 23 69 0B 3E C8 9E 6B FC 01
D4 87 FA E1 E0 BC D2
    RADIUS: Attribute Type: User Name(1)
        RADIUS: Attribute type = User Name
        RADIUS: Attribute length = 17 (0x11)
        RADIUS: User name = [EMAIL PROTECTED]
    RADIUS: Attribute Type: NAS IP Address(4)
        RADIUS: Attribute type = NAS IP Address
        RADIUS: Attribute length = 6 (0x6)
        RADIUS: NAS IP address = 192.168.168.95
    RADIUS: Attribute Type: Called Station ID(30)
        RADIUS: Attribute type = Called Station ID
        RADIUS: Attribute length = 14 (0xE)
        RADIUS: Called station ID = 004096310868
    RADIUS: Attribute Type: Calling Station ID(31)
        RADIUS: Attribute type = Calling Station ID
        RADIUS: Attribute length = 14 (0xE)
        RADIUS: Calling station ID = 0060b3111111
    RADIUS: Attribute Type: NAS Identifier(32)
        RADIUS: Attribute type = NAS Identifier
        RADIUS: Attribute length = 14 (0xE)
        RADIUS: NAS identifier = AP340-310868
    RADIUS: Attribute Type: NAS Port(5)
        RADIUS: Attribute type = NAS Port
        RADIUS: Attribute length = 6 (0x6)
        RADIUS: NAS port = 29 (0x1D)
    RADIUS: Attribute Type: Framed MTU(12)
        RADIUS: Attribute type = Framed MTU
        RADIUS: Attribute length = 6 (0x6)
        RADIUS: Framed MTU = 1400 (0x578)
    RADIUS: Attribute Type: NAS Port Type(61)
        RADIUS: Attribute type = NAS Port Type
        RADIUS: Attribute length = 6 (0x6)
        RADIUS: NAS port type = 0x00000013
    RADIUS: Attribute Type: ARAP EAP Message(79)
        RADIUS: Attribute type = ARAP EAP Message
        RADIUS: Attribute length = 22 (0x16)
        RADIUS: EAP code = Response
        RADIUS: EAP identifier = 9 (0x9)
        RADIUS: EAP length = 20 (0x14)
        RADIUS: EAP data = 01 6B 6B 40 77 69 72 65 6C
65 73 73 2E 63 6F 6D 50 12 B3 12 B6 2E EC 

9A 35 93 92 10 2E C1 F2 CB 13 D4 1D 78 29 02 00...
    RADIUS: Attribute Type: ARAP Signature(80)
        RADIUS: Attribute type = ARAP Signature
        RADIUS: Attribute length = 18 (0x12)
        RADIUS: Signature =
¦¦.8Ü5ôÆ.-=-+
00000:  00 50 22 00 19 5F 00 40 96 31 08 68 08 00 45 
00010:  00 AB 1E 96 00 00 40 11 89 1F C0 A8 A8 5F C0 
00020:  A8 DC 07 36 06 6D 00 97 7B 6A
                                      01 36 00 8F 23
69   
00030:  0B 3E C8 9E 6B FC 01 D4 87 FA E1 E0 BC D2 01 
00040:  6B 6B 40 77 69 72 65 6C 65 73 73 2E 63 6F 6D
04   
00050:  06 C0 A8 A8 5F 1E 0E 30 30 34 30 39 36 33 31 
00060:  38 36 38 1F 0E 30 30 36 30 62 33 31 31 31 31
31   
00070:  31 20 0E 41 50 33 34 30 2D 33 31 30 38 36 38
05   
00080:  06 00 00 00 1D 0C 06 00 00 05 78 3D 06 00 00
00   
00090:  13 4F 16 02 09 00 14 01 6B 6B 40 77 69 72 65 
000A0:  65 73 73 2E 63 6F 6D  
                             50 12 B3 12 B6 2E EC 9A
35   
000B0:  93 92 10 2E C1 F2 CB 13 D4
The isolated sgement is what I use HMAC_MD5 with
secret key : chenwei to digest
But I found the result is not as  B3 12 B6 2E EC 9A 35
93 92 10 2E C1 F2 CB 13 D4                          

The code is compiled by C++builder

#include <stdio.h>
#include <stdlib.h>
#define MD5_CTX         librad_MD5_CTX
#define MD5Init         librad_MD5Init
#define MD5Update       librad_MD5Update
#define MD5Final        librad_MD5Final
#define AUTH_VECTOR_LEN 16 

/* PROTOTYPES should be set to one if and only if the
compiler supports
  function argument prototyping.
  The following makes PROTOTYPES default to 0 if it
has not already
  been defined with C compiler flags.
 */

#    define PROTOTYPES 0


/* POINTER defines a generic pointer type */
typedef unsigned char *POINTER;

/* UINT2 defines a two byte word */
typedef unsigned short int UINT2;

/* UINT4 defines a four byte word */

typedef unsigned long int UINT4;


/* PROTO_LIST is defined depending on how PROTOTYPES
is defined above.
   If using PROTOTYPES, then PROTO_LIST returns the
list, otherwise it
  returns an empty list.
 */

#define PROTO_LIST(list) ()
typedef struct radius_packet {
        //int                   sockfd;
        //uint32_t              src_ipaddr;
        //uint32_t              dst_ipaddr;
        //u_short                       src_port;
        //u_short                       dst_port;
        int                     id;
        int                     code;
        //uint8_t                       vector[AUTH_VECTOR_LEN];
        unsigned char          
vector[AUTH_VECTOR_LEN];
        //time_t                        timestamp;
        int                     verified;
        //uint8_t                       *data;
        unsigned char           *data;
        int                     data_len;
        //VALUE_PAIR            *vps;
} RADIUS_PACKET;
typedef struct {
  UINT4 state[4];                                   /*
state (ABCD) */
  UINT4 count[2];        /* number of bits, modulo
2^64 (lsb first) */
  unsigned char buffer[64];                         /*
input buffer */
} MD5_CTX;

void MD5Init PROTO_LIST ((MD5_CTX *));
void MD5Update PROTO_LIST
  ((MD5_CTX *, const unsigned char *, unsigned int));
void MD5Final PROTO_LIST ((unsigned char [16], MD5_CTX
*));


#define S11 7
#define S12 12
#define S13 17
#define S14 22
#define S21 5
#define S22 9
#define S23 14
#define S24 20
#define S31 4
#define S32 11
#define S33 16
#define S34 23
#define S41 6
#define S42 10
#define S43 15
#define S44 21

void librad_md5_calc(unsigned char *output, unsigned
char *input,
                     unsigned int inputlen);
static void MD5Transform PROTO_LIST ((UINT4 [4], const
unsigned char [64]));
static void Encode PROTO_LIST
  ((unsigned char *, UINT4 *, unsigned int));
static void Decode PROTO_LIST
  ((UINT4 *, const unsigned char *, unsigned int));
static void MD5_memcpy PROTO_LIST ((POINTER, POINTER,
unsigned int));
static void MD5_memset PROTO_LIST ((POINTER, int,
unsigned int));

static const unsigned char PADDING[64] = {
  0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0,
  0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0,
  0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0
};

/* F, G, H and I are basic MD5 functions.
 */
#define F(x, y, z) (((x) & (y)) | ((~x) & (z)))
#define G(x, y, z) (((x) & (z)) | ((y) & (~z)))
#define H(x, y, z) ((x) ^ (y) ^ (z))
#define I(x, y, z) ((y) ^ ((x) | (~z)))

/* ROTATE_LEFT rotates x left n bits.
 */
#define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >>
(32-(n))))

/* FF, GG, HH, and II transformations for rounds 1, 2,
3, and 4.
Rotation is separate from addition to prevent
recomputation.
 */
#define FF(a, b, c, d, x, s, ac) { \
 (a) += F ((b), (c), (d)) + (x) + (UINT4)(ac); \
 (a) = ROTATE_LEFT ((a), (s)); \
 (a) += (b); \
  }
#define GG(a, b, c, d, x, s, ac) { \
 (a) += G ((b), (c), (d)) + (x) + (UINT4)(ac); \
 (a) = ROTATE_LEFT ((a), (s)); \
 (a) += (b); \
  }
#define HH(a, b, c, d, x, s, ac) { \
 (a) += H ((b), (c), (d)) + (x) + (UINT4)(ac); \
 (a) = ROTATE_LEFT ((a), (s)); \
 (a) += (b); \
  }
#define II(a, b, c, d, x, s, ac) { \
 (a) += I ((b), (c), (d)) + (x) + (UINT4)(ac); \
 (a) = ROTATE_LEFT ((a), (s)); \
 (a) += (b); \
  }

void librad_md5_calc(unsigned char *output, unsigned
char *input,
                     unsigned int inlen)
{
        MD5_CTX context;

        MD5Init(&context);
        MD5Update(&context, input, inlen);
        MD5Final(output, &context);
}

/* MD5 initialization. Begins an MD5 operation,
writing a new context.
 */
void MD5Init (context)
MD5_CTX *context;                                     
  /* context */
{
  context->count[0] = context->count[1] = 0;
  /* Load magic initialization constants.
*/
  context->state[0] = 0x67452301;
  context->state[1] = 0xefcdab89;
  context->state[2] = 0x98badcfe;
  context->state[3] = 0x10325476;
}

/* MD5 block update operation. Continues an MD5
message-digest
  operation, processing another message block, and
updating the
  context.
 */
void MD5Update (context, input, inputLen)
MD5_CTX *context;                                     
  /* context */
const unsigned char *input;                           
    /* input block */
unsigned int inputLen;                     /* length
of input block */
{
  unsigned int i, index, partLen;

  /* Compute number of bytes mod 64 */
  index = (unsigned int)((context->count[0] >> 3) &
0x3F);

  /* Update number of bits */
  if ((context->count[0] += ((UINT4)inputLen << 3))
   < ((UINT4)inputLen << 3))
 context->count[1]++;
  context->count[1] += ((UINT4)inputLen >> 29);

  partLen = 64 - index;

  /* Transform as many times as possible.
*/
  if (inputLen >= partLen) {
 MD5_memcpy
   ((POINTER)&context->buffer[index], (POINTER)input,
partLen);
 MD5Transform (context->state, context->buffer);

 for (i = partLen; i + 63 < inputLen; i += 64)
   MD5Transform (context->state, &input[i]);

 index = 0;
  }
  else
 i = 0;

  /* Buffer remaining input */
  MD5_memcpy
 ((POINTER)&context->buffer[index],
(POINTER)&input[i],
  inputLen-i);
}

/* MD5 finalization. Ends an MD5 message-digest
operation, writing the
  the message digest and zeroizing the context.
 */
void MD5Final (digest, context)
unsigned char digest[16];                         /*
message digest */
MD5_CTX *context;                                     
 /* context */
{
  unsigned char bits[8];
  unsigned int index, padLen;

  /* Save number of bits */
  Encode (bits, context->count, 8);

  /* Pad out to 56 mod 64.
*/
  index = (unsigned int)((context->count[0] >> 3) &
0x3f);
  padLen = (index < 56) ? (56 - index) : (120 -
index);
  MD5Update (context, PADDING, padLen);

  /* Append length (before padding) */
  MD5Update (context, bits, 8);

  /* Store state in digest */
  Encode (digest, context->state, 16);

  /* Zeroize sensitive information.
*/
  MD5_memset ((POINTER)context, 0, sizeof (*context));
}

/* MD5 basic transformation. Transforms state based on
block.
 */
static void MD5Transform (state, block)
UINT4 state[4];
const unsigned char block[64];
{
  UINT4 a = state[0], b = state[1], c = state[2], d =
state[3], x[16];

  Decode (x, block, 64);

  /* Round 1 */
  FF (a, b, c, d, x[ 0], S11, 0xd76aa478); /* 1 */
  FF (d, a, b, c, x[ 1], S12, 0xe8c7b756); /* 2 */
  FF (c, d, a, b, x[ 2], S13, 0x242070db); /* 3 */
  FF (b, c, d, a, x[ 3], S14, 0xc1bdceee); /* 4 */
  FF (a, b, c, d, x[ 4], S11, 0xf57c0faf); /* 5 */
  FF (d, a, b, c, x[ 5], S12, 0x4787c62a); /* 6 */
  FF (c, d, a, b, x[ 6], S13, 0xa8304613); /* 7 */
  FF (b, c, d, a, x[ 7], S14, 0xfd469501); /* 8 */
  FF (a, b, c, d, x[ 8], S11, 0x698098d8); /* 9 */
  FF (d, a, b, c, x[ 9], S12, 0x8b44f7af); /* 10 */
  FF (c, d, a, b, x[10], S13, 0xffff5bb1); /* 11 */
  FF (b, c, d, a, x[11], S14, 0x895cd7be); /* 12 */
  FF (a, b, c, d, x[12], S11, 0x6b901122); /* 13 */
  FF (d, a, b, c, x[13], S12, 0xfd987193); /* 14 */
  FF (c, d, a, b, x[14], S13, 0xa679438e); /* 15 */
  FF (b, c, d, a, x[15], S14, 0x49b40821); /* 16 */

 /* Round 2 */
  GG (a, b, c, d, x[ 1], S21, 0xf61e2562); /* 17 */
  GG (d, a, b, c, x[ 6], S22, 0xc040b340); /* 18 */
  GG (c, d, a, b, x[11], S23, 0x265e5a51); /* 19 */
  GG (b, c, d, a, x[ 0], S24, 0xe9b6c7aa); /* 20 */
  GG (a, b, c, d, x[ 5], S21, 0xd62f105d); /* 21 */
  GG (d, a, b, c, x[10], S22,  0x2441453); /* 22 */
  GG (c, d, a, b, x[15], S23, 0xd8a1e681); /* 23 */
  GG (b, c, d, a, x[ 4], S24, 0xe7d3fbc8); /* 24 */
  GG (a, b, c, d, x[ 9], S21, 0x21e1cde6); /* 25 */
  GG (d, a, b, c, x[14], S22, 0xc33707d6); /* 26 */
  GG (c, d, a, b, x[ 3], S23, 0xf4d50d87); /* 27 */
  GG (b, c, d, a, x[ 8], S24, 0x455a14ed); /* 28 */
  GG (a, b, c, d, x[13], S21, 0xa9e3e905); /* 29 */
  GG (d, a, b, c, x[ 2], S22, 0xfcefa3f8); /* 30 */
  GG (c, d, a, b, x[ 7], S23, 0x676f02d9); /* 31 */
  GG (b, c, d, a, x[12], S24, 0x8d2a4c8a); /* 32 */

  /* Round 3 */
  HH (a, b, c, d, x[ 5], S31, 0xfffa3942); /* 33 */
  HH (d, a, b, c, x[ 8], S32, 0x8771f681); /* 34 */
  HH (c, d, a, b, x[11], S33, 0x6d9d6122); /* 35 */
  HH (b, c, d, a, x[14], S34, 0xfde5380c); /* 36 */
  HH (a, b, c, d, x[ 1], S31, 0xa4beea44); /* 37 */
  HH (d, a, b, c, x[ 4], S32, 0x4bdecfa9); /* 38 */
  HH (c, d, a, b, x[ 7], S33, 0xf6bb4b60); /* 39 */
  HH (b, c, d, a, x[10], S34, 0xbebfbc70); /* 40 */
  HH (a, b, c, d, x[13], S31, 0x289b7ec6); /* 41 */
  HH (d, a, b, c, x[ 0], S32, 0xeaa127fa); /* 42 */
  HH (c, d, a, b, x[ 3], S33, 0xd4ef3085); /* 43 */
  HH (b, c, d, a, x[ 6], S34,  0x4881d05); /* 44 */
  HH (a, b, c, d, x[ 9], S31, 0xd9d4d039); /* 45 */
  HH (d, a, b, c, x[12], S32, 0xe6db99e5); /* 46 */
  HH (c, d, a, b, x[15], S33, 0x1fa27cf8); /* 47 */
  HH (b, c, d, a, x[ 2], S34, 0xc4ac5665); /* 48 */

  /* Round 4 */
  II (a, b, c, d, x[ 0], S41, 0xf4292244); /* 49 */
  II (d, a, b, c, x[ 7], S42, 0x432aff97); /* 50 */
  II (c, d, a, b, x[14], S43, 0xab9423a7); /* 51 */
  II (b, c, d, a, x[ 5], S44, 0xfc93a039); /* 52 */
  II (a, b, c, d, x[12], S41, 0x655b59c3); /* 53 */
  II (d, a, b, c, x[ 3], S42, 0x8f0ccc92); /* 54 */
  II (c, d, a, b, x[10], S43, 0xffeff47d); /* 55 */
  II (b, c, d, a, x[ 1], S44, 0x85845dd1); /* 56 */
  II (a, b, c, d, x[ 8], S41, 0x6fa87e4f); /* 57 */
  II (d, a, b, c, x[15], S42, 0xfe2ce6e0); /* 58 */
  II (c, d, a, b, x[ 6], S43, 0xa3014314); /* 59 */
  II (b, c, d, a, x[13], S44, 0x4e0811a1); /* 60 */
  II (a, b, c, d, x[ 4], S41, 0xf7537e82); /* 61 */
  II (d, a, b, c, x[11], S42, 0xbd3af235); /* 62 */
  II (c, d, a, b, x[ 2], S43, 0x2ad7d2bb); /* 63 */
  II (b, c, d, a, x[ 9], S44, 0xeb86d391); /* 64 */

  state[0] += a;
  state[1] += b;
  state[2] += c;
  state[3] += d;

  /* Zeroize sensitive information.
*/
  MD5_memset ((POINTER)x, 0, sizeof (x));
}

/* Encodes input (UINT4) into output (unsigned char).
Assumes len is
  a multiple of 4.
 */
static void Encode (output, input, len)
unsigned char *output;
UINT4 *input;
unsigned int len;
{
  unsigned int i, j;

  for (i = 0, j = 0; j < len; i++, j += 4) {
 output[j] = (unsigned char)(input[i] & 0xff);
 output[j+1] = (unsigned char)((input[i] >> 8) &
0xff);
 output[j+2] = (unsigned char)((input[i] >> 16) &
0xff);
 output[j+3] = (unsigned char)((input[i] >> 24) &
0xff);
  }
}

/* Decodes input (unsigned char) into output (UINT4).
Assumes len is
  a multiple of 4.
 */
static void Decode (output, input, len)
UINT4 *output;
const unsigned char *input;
unsigned int len;
{
  unsigned int i, j;

  for (i = 0, j = 0; j < len; i++, j += 4)
 output[i] = ((UINT4)input[j]) | (((UINT4)input[j+1])
<< 8) |
   (((UINT4)input[j+2]) << 16) | (((UINT4)input[j+3])
<< 24);
}

/* Note: Replace "for loop" with standard memcpy if
possible.
 */

static void MD5_memcpy (output, input, len)
POINTER output;
POINTER input;
unsigned int len;
{
  unsigned int i;

  for (i = 0; i < len; i++)
 output[i] = input[i];
}

/* Note: Replace "for loop" with standard memset if
possible.
 */
static void MD5_memset (output, value, len)
POINTER output;
int value;
unsigned int len;
{
  unsigned int i;

  for (i = 0; i < len; i++)
 ((char *)output)[i] = (char)value;
}

void
lrad_hmac_md5(const unsigned char *text, int text_len,
              const unsigned char *key, int key_len,
              unsigned char *digest)
{
        MD5_CTX context;
        unsigned char k_ipad[65];    /* inner padding
-
                                      * key XORd with
ipad
                                      */
        unsigned char k_opad[65];    /* outer padding
-
                                      * key XORd with
opad
                                      */
        unsigned char tk[16];
        int i;
        /* if key is longer than 64 bytes reset it to
key=MD5(key) */
        if (key_len > 64) {

                MD5_CTX      tctx;

                MD5Init(&tctx);
                MD5Update(&tctx, key, key_len);
                MD5Final(tk, &tctx);

                key = tk;
                key_len = 16;
        }

        /*
         * the HMAC_MD5 transform looks like:
         *
         * MD5(K XOR opad, MD5(K XOR ipad, text))
         *
         * where K is an n byte key
         * ipad is the byte 0x36 repeated 64 times

         * opad is the byte 0x5c repeated 64 times
         * and text is the data being protected
         */

        /* start out by storing key in pads */
        memset( k_ipad, 0, sizeof(k_ipad));
        memset( k_opad, 0, sizeof(k_opad));
        memcpy( k_ipad, key, key_len);
        memcpy( k_opad, key, key_len);

        /* XOR key with ipad and opad values */
        for (i = 0; i < 64; i++) {
                k_ipad[i] ^= 0x36;
                k_opad[i] ^= 0x5c;
        }
        /*
         * perform inner MD5
         */
        MD5Init(&context);                   /* init
context for 1st
                                              * pass
*/
        MD5Update(&context, k_ipad, 64);      /* start
with inner pad */
        MD5Update(&context, text, text_len); /* then
text of datagram */
        MD5Final(digest, &context);          /* finish
up 1st pass */
        /*
         * perform outer MD5
         */
        MD5Init(&context);                   /* init
context for 2nd
                                              * pass
*/
        MD5Update(&context, k_opad, 64);     /* start
with outer pad */
        MD5Update(&context, digest, 16);     /* then
results of 1st
                                              * hash
*/
        MD5Final(digest, &context);          /* finish
up 2nd pass */
}

/*
Test Vectors (Trailing '\0' of a character string not
included in test):

  key =         0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b
  key_len =     16 bytes
  data =        "Hi There"
  data_len =    8  bytes
  digest =      0x9294727a3638bb1c13f48ef8158bfc9d

  key =         "Jefe"
  data =        "what do ya want for nothing?"
  data_len =    28 bytes
  digest =      0x750c783e6ab0b503eaa86e310a5db738

  key =         0xAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

  key_len       16 bytes
  data =        0xDDDDDDDDDDDDDDDDDDDD...
                ..DDDDDDDDDDDDDDDDDDDD...
                ..DDDDDDDDDDDDDDDDDDDD...
                ..DDDDDDDDDDDDDDDDDDDD...
                ..DDDDDDDDDDDDDDDDDDDD
  data_len =    50 bytes
  digest =      0x56be34521d144c88dbb8c733f0e8b3f6
*/


/*
 *      Validates the requesting client NAS.  Calculates
the
 *      signature based on the clients private key.
 */
/*
static int calc_acctdigest(RADIUS_PACKET *packet,
const char *secret)
{
        u_char          digest[AUTH_VECTOR_LEN];
        MD5_CTX context;

        /*
         *      Older clients have the authentication vector set
to
         *      all zeros. Return `1' in that case.
         */
/*      memset(digest, 0, sizeof(digest));
        if (memcmp(packet->vector, digest, AUTH_VECTOR_LEN)
== 0) {
                packet->verified = 1;
                return 1;
        }

        /*
         *      Zero out the auth_vector in the received packet.
         *      Then append the shared secret to the received
packet,
         *      and calculate the MD5 sum. This must be the same
         *      as the original MD5 sum (packet->vector).
         */
/*      memset(packet->data + 4, 0, AUTH_VECTOR_LEN);

        /*
         *  MD5(packet + secret);
         */
/*      MD5Init(&context);
        MD5Update(&context, packet->data, packet->data_len);
        MD5Update(&context, secret, strlen(secret));
        MD5Final(digest, &context);

        /*
         *      Return 0 if OK, 2 if not OK.
         */
/*      packet->verified =
        memcmp(digest, packet->vector, AUTH_VECTOR_LEN) ? 2 :
0;

        return packet->verified;
}

/*
 *      Validates the requesting client NAS.  Calculates
the
 *      signature based on the clients private key.
 */
/*
static int calc_replydigest(RADIUS_PACKET *packet,
RADIUS_PACKET *original, const char *secret)
{
        uint8_t         calc_digest[AUTH_VECTOR_LEN];
        MD5_CTX         context;

        /*
         *  Copy the original vector in place.
         */
/*      memcpy(packet->data + 4, original->vector,
sizeof(original->vector));

        /*
         *  MD5(packet + secret);
         */
/*      MD5Init(&context);
        MD5Update(&context, packet->data, packet->data_len);
        MD5Update(&context, secret, strlen(secret));
        MD5Final(calc_digest, &context);

        /*
         *  Copy the packet's vector back to the packet.
         */
/*      memcpy(packet->data + 4, packet->vector,
sizeof(packet->vector));

        /*
         *      Return 0 if OK, 2 if not OK.
         */
/*      packet->verified =
                memcmp(packet->vector, calc_digest,
sizeof(packet->vector)) ? 2 : 0;
        return packet->verified;
}
*/
int main(int argc, char **argv)
{
  unsigned char digest[16];
  char *key;
  int key_len;
  char *text;
  int text_len;
  int i;

  key = argv[1];
  key = "Jefe";
 
sprintf(key,"%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c",0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b,0x0b);
 
sprintf(key,"%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c",0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa,0xaa);
  key = "chenwei";
  key_len = strlen(key);

  text = argv[2];
  text = "what do ya want for nothing?";
  text = "Hi There";
  
sprintf(text,"%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c",
       
0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd,0xdd);
   sprintf(text,
       
"%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c%c",
        0x01,0x36,0x00,0x8f,0x23,0x69,
       
0x0b,0x3e,0xc8,0x9e,0x6b,0xfc,0x01,0xd4,0x87,0xfa,0xe1,0xe0,0xbc,0xd2,0x01,0x11,
       
0x6B,0x6B,0x40,0x77,0x69,0x72,0x65,0x6C,0x65,0x73,0x73,0x2E,0x63,0x6F,0x6D,0x04,
       
0x06,0xC0,0xA8,0xA8,0x5F,0x1E,0x0E,0x30,0x30,0x34,0x30,0x39,0x36,0x33,0x31,0x30,
       
0x38,0x36,0x38,0x1F,0x0E,0x30,0x30,0x36,0x30,0x62,0x33,0x31,0x31,0x31,0x31,0x31,
       
0x31,0x20,0x0E,0x41,0x50,0x33,0x34,0x30,0x2D,0x33,0x31,0x30,0x38,0x36,0x38,0x05,
       
0x06,0x00,0x00,0x00,0x1D,0x0C,0x06,0x00,0x00,0x05,0x78,0x3D,0x06,0x00,0x00,0x00,
       
0x13,0x4F,0x16,0x02,0x09,0x00,0x14,0x01,0x6B,0x6B,0x40,0x77,0x69,0x72,0x65,0x6C,
        0x65,0x73,0x73,0x2E,0x63,0x6F,0x6D
        );


  text_len = strlen(text);

  lrad_hmac_md5(text, text_len, key, key_len, digest);

  for (i = 0; i < 16; i++) {
    printf("%02x", digest[i]);
  }
  printf("\n");
  gets(digest);

  exit(0);
  return 0;
}






-----------------------------------------------------------------
< �C�ѳ� Yahoo!�_�� >  www.yahoo.com.tw

- 
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to