176455e5facc141c: No root crt list specified -- certificate will not be verified. 176455e5facc141c: Sending ALPN list (1): hq-interop 176455e5facc141c: Sending transport parameter TLS extension (85 bytes): 176455e5facc141c: Extension list (85 bytes): 176455e5facc141c: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 176455e5facc141c: Extension type: 4 (initial_max_data), length 4, 80100000 176455e5facc141c: Extension type: 8 (max_streams_bidi), length 2, 4200 176455e5facc141c: Extension type: 1 (idle_timeout), length 4, 8002bf20 176455e5facc141c: Extension type: 3 (max_packet_size), length 2, 45a0 176455e5facc141c: Extension type: 9 (max_streams_uni), length 2, 4200 176455e5facc141c: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 176455e5facc141c: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 176455e5facc141c: Extension type: 14 (active_connection_id_limit), length 1, 08 176455e5facc141c: Extension type: 11 (max_ack_delay), length 1, 0a 176455e5facc141c: Extension type: 15 (hcid), length 8, 53c61d6a7aa137fc 176455e5facc141c: Extension type: 771 (unknown), length 4, 80006455 176455e5facc141c: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 176455e5facc141c: Extension type: 29016 (enable_time_stamp), length 1, 03 176455e5facc141c: Extension type: 10930 (grease_quic_bit), length 0 176455e5facc141c: Preparing GET on stream 0 for /rgrfhsacvu 176455e5facc141c: Sending packet type: 2 (initial), S0, Q1, Version 1, 176455e5facc141c: <176455e5facc141c>, <53c61d6a7aa137fc>, Seq: 67202, pl: 441 176455e5facc141c: Token length: 0 176455e5facc141c: Prepared 421 bytes 176455e5facc141c: ping, 1 bytes 176455e5facc141c: crypto_hs, offset 0, length 416: 0100019c030367e2... 176455e5facc141c: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 176455e5facc141c: <176455e5facc141c>, <53c61d6a7aa137fc>, Seq: 0, pl: 760 176455e5facc141c: Prepared 740 bytes 176455e5facc141c: stream 0, offset 0, length 17, fin = 1: 474554202f726772... 176455e5facc141c: padding, 720 bytes 176455e5facc141c: Sending 1252 bytes to 193.167.100.100:443 at T=0.001963 (3981f154) 176455e5facc141c: Receiving 1200 bytes from 193.167.100.100:443 at T=0.037568 (39827c69) 176455e5facc141c: Receiving packet type: 2 (initial), S0, Q1, Version 1, 176455e5facc141c: <53c61d6a7aa137fc>, , Seq: 0, pl: 160 176455e5facc141c: Token length: 0 176455e5facc141c: Decrypted 142 bytes 176455e5facc141c: ack (nb=0), 67202 176455e5facc141c: crypto_hs, offset 0, length 129: 0200007d0303ba2f... 176455e5facc141c: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 176455e5facc141c: <53c61d6a7aa137fc>, , Seq: 1, pl: 210 176455e5facc141c: Decrypted 192 bytes 176455e5facc141c: crypto_hs, offset 0, length 188: 0800008400820010... 176455e5facc141c: Received transport parameter TLS extension (105 bytes): 176455e5facc141c: Extension list (105 bytes): 176455e5facc141c: Extension type: 0 (ocid), length 8, 176455e5facc141c 176455e5facc141c: Extension type: 1 (idle_timeout), length 4, 8000ea60 176455e5facc141c: Extension type: 2 (stateless_reset_token), length 16, f13cf1a53fdd70068ff503afee082403 176455e5facc141c: Extension type: 4 (initial_max_data), length 4, 80100000 176455e5facc141c: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 176455e5facc141c: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 176455e5facc141c: Extension type: 7 (max_stream_data_uni), length 4, 80100000 176455e5facc141c: Extension type: 8 (max_streams_bidi), length 2, 4080 176455e5facc141c: Extension type: 9 (max_streams_uni), length 2, 4080 176455e5facc141c: Extension type: 10 (ack_delay_exponent), length 1, 03 176455e5facc141c: Extension type: 11 (max_ack_delay), length 1, 19 176455e5facc141c: Extension type: 14 (active_connection_id_limit), length 1, 08 176455e5facc141c: Extension type: 15 (hcid), length 8, ba2e3bed02e482de 176455e5facc141c: Extension type: 17 (version_negotiation), length 12, 00000001000000016b3343cf 176455e5facc141c: Extension type: 32 (max_datagram_frame_size), length 4, 80010000 176455e5facc141c: Receiving packet type: 6 (1rtt protected), S0, Q1, 176455e5facc141c: <53c61d6a7aa137fc>, Seq: 2 (2), Phi: 0, 176455e5facc141c: Decrypted 752 bytes 176455e5facc141c: crypto_hs, offset 0, length 89: 0400005500015180... 176455e5facc141c: padding, 659 bytes 176455e5facc141c: T= 0.037568, cwin: 15811,flight: 785,nb_ret: 0,rtt_min: 35605,rtt: 35605,rtt_var: 17802,max_ack_delay: 0,state: 10 176455e5facc141c: The session was properly resumed! 176455e5facc141c: Zero RTT data is accepted! 176455e5facc141c: Negotiated ALPN: hq-interop 176455e5facc141c: Sending packet type: 4 (handshake), S0, Q1, Version 1, 176455e5facc141c: , <53c61d6a7aa137fc>, Seq: 0, pl: 80 176455e5facc141c: Prepared 60 bytes 176455e5facc141c: ack (nb=0), 1 176455e5facc141c: crypto_hs, offset 0, length 52: 1400003097c0400a... 176455e5facc141c: Sending packet type: 6 (1rtt protected), S1, Q1, 176455e5facc141c: , Seq: 1 (1), Phi: 0, 176455e5facc141c: Prepared 285 bytes 176455e5facc141c: ack (nb=0), 2 176455e5facc141c: new_connection_id[1]: 0x5fd7413bf3431bbf, 35d5f322c2b3a65c2e93e96c74d04dc5 176455e5facc141c: new_connection_id[2]: 0x6c0b680f709175ad, cb6492a9d220089ba95fa32f5289df2b 176455e5facc141c: new_connection_id[3]: 0x68d99c90dfc5e22a, 9fbdad7c078638dc66f2e5eb1b02591f 176455e5facc141c: new_connection_id[4]: 0xb20a7c712c86a1d2, 672b55c98397275491cc27394f09c7d0 176455e5facc141c: new_connection_id[5]: 0x66a4751fdca77088, fdb13aecbc17bc0a1c04d0ca94e6a063 176455e5facc141c: new_connection_id[6]: 0xb604635e8b8fe352, 866c3b4fbc6a34588fe8f1f0aa21ed7f 176455e5facc141c: new_connection_id[7]: 0xd6ea7286e35c3ae5, bf6389d13afb28e8932a00462950343f 176455e5facc141c: padding, 84 bytes 176455e5facc141c: T= 0.038013, cwin: 15811,flight: 1201,nb_ret: 0,rtt_min: 35605,rtt: 35605,rtt_var: 17802,max_ack_delay: 0,state: 13 176455e5facc141c: Sending 416 bytes to 193.167.100.100:443 at T=0.038013 (39827e26) 176455e5facc141c: Connection established. Version = 1, I-CID: 176455e5facc141c, verified: 1 176455e5facc141c: Receiving 230 bytes from 193.167.100.100:443 at T=0.070624 (3982fd89) 176455e5facc141c: Receiving packet type: 6 (1rtt protected), S1, Q1, 176455e5facc141c: <53c61d6a7aa137fc>, Seq: 3 (3), Phi: 0, 176455e5facc141c: Decrypted 203 bytes 176455e5facc141c: ack (nb=0), 0-1 176455e5facc141c: handshake_done 176455e5facc141c: new_connection_id[1]: 0xe6a4b331738d2769, 6096e0132690a545f535ca791136f1cf 176455e5facc141c: new_connection_id[2]: 0x2430b7ce2d5aa0a4, 0195c32c26a3e5d9e3a6ced0ca34b651 176455e5facc141c: new_connection_id[3]: 0xa215145443b54d83, 98f1813031f299d53ae10636488c25c4 176455e5facc141c: new_connection_id[4]: 0x7585e44ffd48e4b6, 7ddecbb75b320224401a64d3935b3514 176455e5facc141c: new_connection_id[5]: 0xb2e1d8eb250d66e8, 3e71a9c7f6cf7794855b7cba26c0db80 176455e5facc141c: new_connection_id[6]: 0xc3fa884cfce5e6c2, 04793dfc3ef448f4b807662eaff494dd 176455e5facc141c: new_connection_id[7]: 0x6e2ea462c7a9f5e1, 8506bdea3d15ae74571247cbe9083676 176455e5facc141c: T= 0.070624, cwin: 16964,flight: 0,nb_ret: 0,rtt_min: 32611,rtt: 35230,rtt_var: 14100,max_ack_delay: 0,state: 14 176455e5facc141c: Sending packet type: 6 (1rtt protected), S0, Q1, 176455e5facc141c: , Seq: 2 (2), Phi: 0, 176455e5facc141c: Prepared 29 bytes 176455e5facc141c: ack (nb=0), 2-3 176455e5facc141c: padding, 23 bytes 176455e5facc141c: T= 0.074773, cwin: 16964,flight: 55,nb_ret: 0,rtt_min: 32611,rtt: 35230,rtt_var: 14100,max_ack_delay: 0,state: 14 176455e5facc141c: Sending 55 bytes to 193.167.100.100:443 at T=0.074773 (39830dbe) 176455e5facc141c: Receiving 29 bytes from 193.167.100.100:443 at T=0.201238 (3984fbbf) 176455e5facc141c: Receiving packet type: 6 (1rtt protected), S0, Q1, 176455e5facc141c: <53c61d6a7aa137fc>, Seq: 5 (5), Phi: 0, 176455e5facc141c: Decrypted 2 bytes 176455e5facc141c: ping, 1 bytes 176455e5facc141c: padding, 1 bytes 176455e5facc141c: T= 0.201238, cwin: 1307,flight: 0,nb_ret: 0,rtt_min: 32611,rtt: 35230,rtt_var: 14100,max_ack_delay: 0,state: 14 176455e5facc141c: Sending packet type: 6 (1rtt protected), S1, Q1, 176455e5facc141c: , Seq: 3 (3), Phi: 0, 176455e5facc141c: Prepared 29 bytes 176455e5facc141c: ack (nb=1), 5, 2-3 176455e5facc141c: padding, 22 bytes 176455e5facc141c: T= 0.201378, cwin: 1307,flight: 55,nb_ret: 0,rtt_min: 32611,rtt: 35230,rtt_var: 14100,max_ack_delay: 0,state: 14 176455e5facc141c: Sending 55 bytes to 193.167.100.100:443 at T=0.201378 (3984fc4b) 176455e5facc141c: Receiving 1055 bytes from 193.167.100.100:443 at T=0.233443 (3985798c) 176455e5facc141c: Receiving packet type: 6 (1rtt protected), S1, Q1, 176455e5facc141c: <53c61d6a7aa137fc>, Seq: 6 (6), Phi: 0, 176455e5facc141c: Decrypted 1028 bytes 176455e5facc141c: stream 0, offset 0, length 1024, fin = 1: a6379b3a7a1f344e... 176455e5facc141c: T= 0.233443, cwin: 1307,flight: 55,nb_ret: 0,rtt_min: 32611,rtt: 35230,rtt_var: 14100,max_ack_delay: 0,state: 14 176455e5facc141c: All done, Closing the connection. 176455e5facc141c: Sending packet type: 6 (1rtt protected), S0, Q1, 176455e5facc141c: , Seq: 4 (4), Phi: 0, 176455e5facc141c: Prepared 10 bytes 176455e5facc141c: ack (nb=1), 5-6, 2-3 176455e5facc141c: application_close, Error 0x0000, Reason length 0 176455e5facc141c: Sending 36 bytes to 193.167.100.100:443 at T=0.233689 (39857a82) 176455e5facc141c: Receiving 29 bytes from 193.167.100.100:443 at T=0.305312 (39869249) 176455e5facc141c: Receiving packet type: 6 (1rtt protected), S1, Q1, 176455e5facc141c: <53c61d6a7aa137fc>, Seq: 7 (7), Phi: 0, 176455e5facc141c: Decrypted 2 bytes 176455e5facc141c: ping, 1 bytes 176455e5facc141c: padding, 1 bytes 176455e5facc141c: Sending packet type: 6 (1rtt protected), S0, Q1, 176455e5facc141c: , Seq: 5 (5), Phi: 0, 176455e5facc141c: Prepared 3 bytes 176455e5facc141c: application_close, Error 0x0000, Reason length 0 176455e5facc141c: Sending 29 bytes to 193.167.100.100:443 at T=0.305388 (39869295) 176455e5facc141c: Out of 1 zero RTT packets, 1 were acked by the server. 176455e5facc141c: Received 1024 bytes in 0.541681 seconds, 0.015123 Mbps. 176455e5facc141c: Sent 17 bytes in 0.541681 seconds, 0.000251 Mbps.