35cded99450cda1c: No root crt list specified -- certificate will not be verified. 35cded99450cda1c: Sending ALPN list (1): hq-interop 35cded99450cda1c: Sending transport parameter TLS extension (85 bytes): 35cded99450cda1c: Extension list (85 bytes): 35cded99450cda1c: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 35cded99450cda1c: Extension type: 4 (initial_max_data), length 4, 80100000 35cded99450cda1c: Extension type: 8 (max_streams_bidi), length 2, 4200 35cded99450cda1c: Extension type: 1 (idle_timeout), length 4, 8002bf20 35cded99450cda1c: Extension type: 3 (max_packet_size), length 2, 45a0 35cded99450cda1c: Extension type: 9 (max_streams_uni), length 2, 4200 35cded99450cda1c: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 35cded99450cda1c: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 35cded99450cda1c: Extension type: 14 (active_connection_id_limit), length 1, 08 35cded99450cda1c: Extension type: 11 (max_ack_delay), length 1, 0a 35cded99450cda1c: Extension type: 15 (hcid), length 8, d68b5a11e3e69b69 35cded99450cda1c: Extension type: 1701 (unknown), length 4, 8000cded 35cded99450cda1c: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 35cded99450cda1c: Extension type: 29016 (enable_time_stamp), length 1, 03 35cded99450cda1c: Extension type: 10930 (grease_quic_bit), length 0 35cded99450cda1c: Preparing GET on stream 0 for /bitter-hot-smartwatch 35cded99450cda1c: Sending packet type: 2 (initial), S0, Q1, Version 1, 35cded99450cda1c: <35cded99450cda1c>, , Seq: 125126, pl: 441 35cded99450cda1c: Token length: 0 35cded99450cda1c: Prepared 421 bytes 35cded99450cda1c: ping, 1 bytes 35cded99450cda1c: crypto_hs, offset 0, length 416: 0100019c0303bfe5... 35cded99450cda1c: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 35cded99450cda1c: <35cded99450cda1c>, , Seq: 0, pl: 760 35cded99450cda1c: Prepared 740 bytes 35cded99450cda1c: stream 0, offset 0, length 28, fin = 1: 474554202f626974... 35cded99450cda1c: padding, 709 bytes 35cded99450cda1c: Sending 1252 bytes to 193.167.100.100:443 at T=0.001873 (26d36a3e) 35cded99450cda1c: T= 0.252171, Lost packet type 2, number 125126, size 451, DCID <>, reason: timer 35cded99450cda1c: Sending packet type: 2 (initial), S0, Q1, Version 1, 35cded99450cda1c: <35cded99450cda1c>, , Seq: 125127, pl: 441 35cded99450cda1c: Token length: 0 35cded99450cda1c: Prepared 421 bytes 35cded99450cda1c: ping, 1 bytes 35cded99450cda1c: crypto_hs, offset 0, length 416: 0100019c0303bfe5... 35cded99450cda1c: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 35cded99450cda1c: <35cded99450cda1c>, , Seq: 1, pl: 760 35cded99450cda1c: Prepared 740 bytes 35cded99450cda1c: padding, 740 bytes 35cded99450cda1c: Sending 1252 bytes to 193.167.100.100:443 at T=0.252171 (26d73bf8) 35cded99450cda1c: Receiving 1200 bytes from 193.167.100.100:443 at T=0.286856 (26d7c375) 35cded99450cda1c: Receiving packet type: 2 (initial), S0, Q1, Version 1, 35cded99450cda1c: , <5f7972cf0d9f2dbf>, Seq: 0, pl: 160 35cded99450cda1c: Token length: 0 35cded99450cda1c: Decrypted 142 bytes 35cded99450cda1c: ack (nb=0), 125127 35cded99450cda1c: crypto_hs, offset 0, length 129: 0200007d03033a2a... 35cded99450cda1c: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 35cded99450cda1c: , <5f7972cf0d9f2dbf>, Seq: 1, pl: 210 35cded99450cda1c: Decrypted 192 bytes 35cded99450cda1c: crypto_hs, offset 0, length 188: 0800008400820010... 35cded99450cda1c: Received transport parameter TLS extension (105 bytes): 35cded99450cda1c: Extension list (105 bytes): 35cded99450cda1c: Extension type: 0 (ocid), length 8, 35cded99450cda1c 35cded99450cda1c: Extension type: 1 (idle_timeout), length 4, 8000ea60 35cded99450cda1c: Extension type: 2 (stateless_reset_token), length 16, 546fc76b77e695d129aa756181f3f3cc 35cded99450cda1c: Extension type: 4 (initial_max_data), length 4, 80100000 35cded99450cda1c: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 35cded99450cda1c: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 35cded99450cda1c: Extension type: 7 (max_stream_data_uni), length 4, 80100000 35cded99450cda1c: Extension type: 8 (max_streams_bidi), length 2, 4080 35cded99450cda1c: Extension type: 9 (max_streams_uni), length 2, 4080 35cded99450cda1c: Extension type: 10 (ack_delay_exponent), length 1, 03 35cded99450cda1c: Extension type: 11 (max_ack_delay), length 1, 19 35cded99450cda1c: Extension type: 14 (active_connection_id_limit), length 1, 08 35cded99450cda1c: Extension type: 15 (hcid), length 8, 5f7972cf0d9f2dbf 35cded99450cda1c: Extension type: 17 (version_negotiation), length 12, 00000001000000016b3343cf 35cded99450cda1c: Extension type: 32 (max_datagram_frame_size), length 4, 80010000 35cded99450cda1c: Receiving packet type: 6 (1rtt protected), S0, Q1, 35cded99450cda1c: , Seq: 2 (2), Phi: 0, 35cded99450cda1c: Decrypted 752 bytes 35cded99450cda1c: crypto_hs, offset 0, length 89: 0400005500015180... 35cded99450cda1c: padding, 659 bytes 35cded99450cda1c: T= 0.286856, cwin: 15811,flight: 1570,nb_ret: 1,rtt_min: 34685,rtt: 34685,rtt_var: 17342,max_ack_delay: 0,state: 10 35cded99450cda1c: The session was properly resumed! 35cded99450cda1c: Zero RTT data is accepted! 35cded99450cda1c: Negotiated ALPN: hq-interop 35cded99450cda1c: Sending packet type: 4 (handshake), S0, Q1, Version 1, 35cded99450cda1c: <5f7972cf0d9f2dbf>, , Seq: 0, pl: 80 35cded99450cda1c: Prepared 60 bytes 35cded99450cda1c: ack (nb=0), 1 35cded99450cda1c: crypto_hs, offset 0, length 52: 14000030c3f83b7f... 35cded99450cda1c: T= 0.287297, Lost packet type 5, number 0, size 769, DCID <5f7972cf0d9f2dbf>, reason: timer 35cded99450cda1c: Sending packet type: 6 (1rtt protected), S1, Q1, 35cded99450cda1c: <5f7972cf0d9f2dbf>, Seq: 2 (2), Phi: 0, 35cded99450cda1c: Prepared 285 bytes 35cded99450cda1c: ack (nb=0), 2 35cded99450cda1c: new_connection_id[1]: 0x94f4610f60683bd1, 41653f2bc59459c9db091f873a11477a 35cded99450cda1c: new_connection_id[2]: 0xc5d4450538e88ca9, e80b6eee0d3b2104d7b90618dd13960f 35cded99450cda1c: new_connection_id[3]: 0xbab035c6459bf1a4, e16156e36cbbc4d36cd8518a219a6876 35cded99450cda1c: new_connection_id[4]: 0xc0b83e2de59fdd6c, 68cc6c3aafb04979087c161372ded3df 35cded99450cda1c: new_connection_id[5]: 0x36b03b0e50a96236, f37d8bbc7602c72b900c5d6d235cb6b5 35cded99450cda1c: new_connection_id[6]: 0xc0a2219b7e4f481d, d60964bc1703f837903ba8671d5ec414 35cded99450cda1c: new_connection_id[7]: 0x0a8f47e45364b2b9, 94d951dced6c47276ee811b45ae137d9 35cded99450cda1c: stream 0, offset 0, length 28, fin = 1: 474554202f626974... 35cded99450cda1c: padding, 53 bytes 35cded99450cda1c: T= 0.287297, cwin: 15811,flight: 1201,nb_ret: 2,rtt_min: 34685,rtt: 34685,rtt_var: 17342,max_ack_delay: 0,state: 13 35cded99450cda1c: Sending 416 bytes to 193.167.100.100:443 at T=0.287297 (26d7c52e) 35cded99450cda1c: Connection established. Version = 1, I-CID: 35cded99450cda1c, verified: 1 35cded99450cda1c: Receiving 224 bytes from 193.167.100.100:443 at T=0.319238 (26d841f3) 35cded99450cda1c: Receiving packet type: 6 (1rtt protected), S1, Q1, 35cded99450cda1c: , Seq: 3 (3), Phi: 0, 35cded99450cda1c: Decrypted 197 bytes 35cded99450cda1c: handshake_done 35cded99450cda1c: new_connection_id[1]: 0x2433038964e73453, 4d6c5454f0f785d636323c756a1a6a5a 35cded99450cda1c: new_connection_id[2]: 0x846ba4e11d74ebeb, 85aeb5358d21bce74e175197464e065c 35cded99450cda1c: new_connection_id[3]: 0x5eaf40cf38843e31, 91ed2f694022bb3972e3e6dddebf1f20 35cded99450cda1c: new_connection_id[4]: 0xaf424577409bc23b, f6c38e89ce6e5ba0613f694ed1b237a4 35cded99450cda1c: new_connection_id[5]: 0xae1817e771c1477a, 0d9e0c4281c637f97756640ac312a300 35cded99450cda1c: new_connection_id[6]: 0xfa2747146012cc24, c9fdfb3bb5ef3a04152d3505b1a4a688 35cded99450cda1c: new_connection_id[7]: 0x4a909f74d03bbe8b, 79652d0137af8f857159ea2a0666d06b 35cded99450cda1c: T= 0.319238, cwin: 15811,flight: 1096,nb_ret: 2,rtt_min: 34685,rtt: 34685,rtt_var: 17342,max_ack_delay: 0,state: 14 35cded99450cda1c: Receiving 33 bytes from 193.167.100.100:443 at T=0.319468 (26d842d9) 35cded99450cda1c: Receiving packet type: 6 (1rtt protected), S1, Q1, 35cded99450cda1c: , Seq: 4 (4), Phi: 0, 35cded99450cda1c: Decrypted 6 bytes 35cded99450cda1c: ack (nb=0), 1-2 35cded99450cda1c: T= 0.319468, cwin: 16875,flight: 0,nb_ret: 2,rtt_min: 32171,rtt: 34370,rtt_var: 13635,max_ack_delay: 0,state: 14 35cded99450cda1c: Sending packet type: 6 (1rtt protected), S0, Q1, 35cded99450cda1c: <5f7972cf0d9f2dbf>, Seq: 3 (3), Phi: 0, 35cded99450cda1c: Prepared 29 bytes 35cded99450cda1c: ack (nb=0), 3-4 35cded99450cda1c: padding, 24 bytes 35cded99450cda1c: T= 0.319511, cwin: 16875,flight: 55,nb_ret: 2,rtt_min: 32171,rtt: 34370,rtt_var: 13635,max_ack_delay: 0,state: 14 35cded99450cda1c: Sending 55 bytes to 193.167.100.100:443 at T=0.319511 (26d84304) 35cded99450cda1c: Receiving 1055 bytes from 193.167.100.100:443 at T=0.320841 (26d84836) 35cded99450cda1c: Receiving packet type: 6 (1rtt protected), S1, Q1, 35cded99450cda1c: , Seq: 5 (5), Phi: 0, 35cded99450cda1c: Decrypted 1028 bytes 35cded99450cda1c: stream 0, offset 0, length 1024, fin = 1: 7a4337a00fe6ba3f... 35cded99450cda1c: T= 0.320841, cwin: 16875,flight: 55,nb_ret: 2,rtt_min: 32171,rtt: 34370,rtt_var: 13635,max_ack_delay: 0,state: 14 35cded99450cda1c: All done, Closing the connection. 35cded99450cda1c: Sending packet type: 6 (1rtt protected), S0, Q1, 35cded99450cda1c: <5f7972cf0d9f2dbf>, Seq: 4 (4), Phi: 0, 35cded99450cda1c: Prepared 8 bytes 35cded99450cda1c: ack (nb=0), 3-5 35cded99450cda1c: application_close, Error 0x0000, Reason length 0 35cded99450cda1c: Sending 34 bytes to 193.167.100.100:443 at T=0.320970 (26d848b7) 35cded99450cda1c: Out of 2 zero RTT packets, 1 were acked by the server. 35cded99450cda1c: Received 1024 bytes in 0.622159 seconds, 0.013167 Mbps. 35cded99450cda1c: Sent 28 bytes in 0.622159 seconds, 0.000360 Mbps.