This website requires JavaScript.
Explore
Help
Sign In
uppal
0 Followers
·
0 Following
Joined on
2025-12-13
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
User to block:
Optional note:
The note is not visible to the blocked user.
Cancel
Block
Repositories
2
Projects
Packages
Public Activity
Starred Repositories
uppal
synced commits to
master
at
uppal/cgrates
from mirror
2026-01-09 18:10:00 +05:00
fe4d8b5924
radagent: check CHAP-Challenge AVP for CHAP auth
d73e9c0803
radagent: use MS-CHAP2-Response for MSCHAPv2
Compare 2 commits »
uppal
synced commits to
master
at
uppal/cgrates
from mirror
2026-01-08 01:19:59 +05:00
63d36568dc
update go-diameter library
uppal
synced commits to
master
at
uppal/cgrates
from mirror
2026-01-07 00:49:58 +05:00
d41044af3c
ips: add basic functionality integration test
55426255b2
ips: add radius IPAM integration test
6695db8df7
updated GetActions api to return negative destinations
Compare 3 commits »
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-24 22:18:22 +05:00
39a45a2151
fixes
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-24 09:16:49 +05:00
5346aad6fb
cleanup
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-24 09:09:16 +05:00
2acf4636bb
Match exact CGRateS oldtutorial PAP auth pattern
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-24 08:59:33 +05:00
b6c12a5e36
Fix attribute path: use *req.Password like CGRateS tutorial
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-24 08:56:20 +05:00
41847a0793
Fix filter to match User-Name instead of Account
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-24 00:26:13 +05:00
cab4ca64fb
Setup PAP auth exactly like CGRateS test configuration
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 23:33:23 +05:00
0d78fcf681
Switch to authorization-only approach (like sample config)
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 23:32:13 +05:00
8e7894cd30
Simplify: Single PAP auth processor with hardcoded password
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 23:31:10 +05:00
d2068924c9
Fix: Add *none request type flag to AuthGetPassword processor
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 23:30:03 +05:00
9c21307ad3
Add proper PAP authentication with *strip fix for null padding
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 23:24:08 +05:00
dd335be7f5
Bypass auth with *none flag - workaround for PAP null-padding bug
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 23:21:27 +05:00
11ee815a44
Simplify PAP auth - hardcode password to test basic flow
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 23:20:15 +05:00
03f47078de
Use *message flag instead of *dry_run for attributes fetch
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 23:15:28 +05:00
ca09317856
Simplify to PAP authentication only for initial testing
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 21:13:42 +05:00
f6bcdccf9c
Workaround CGRateS MS-CHAPv2 bug - use *event instead of *radauth
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 21:08:55 +05:00
918e9c8cff
Simplify MS-CHAPv2 auth - remove accounts check that requires MaxUsage
uppal
pushed to
main
at
uppal/cgrates-radius
2025-12-23 21:07:08 +05:00
dfb925494c
Implement proper MS-CHAPv2 authentication for MikroTik PPPoE
First
Previous
1
2
3
Next
Last