353d4a33fee61ecc: No root crt list specified -- certificate will not be verified. 353d4a33fee61ecc: Sending ALPN list (1): hq-interop 353d4a33fee61ecc: Sending transport parameter TLS extension (83 bytes): 353d4a33fee61ecc: Extension list (83 bytes): 353d4a33fee61ecc: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 353d4a33fee61ecc: Extension type: 4 (initial_max_data), length 4, 80100000 353d4a33fee61ecc: Extension type: 8 (max_streams_bidi), length 2, 4200 353d4a33fee61ecc: Extension type: 1 (idle_timeout), length 4, 8002bf20 353d4a33fee61ecc: Extension type: 3 (max_packet_size), length 2, 45a0 353d4a33fee61ecc: Extension type: 9 (max_streams_uni), length 2, 4200 353d4a33fee61ecc: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 353d4a33fee61ecc: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 353d4a33fee61ecc: Extension type: 14 (active_connection_id_limit), length 1, 08 353d4a33fee61ecc: Extension type: 11 (max_ack_delay), length 1, 0a 353d4a33fee61ecc: Extension type: 15 (hcid), length 8, 833eb33db96dcdbc 353d4a33fee61ecc: Extension type: 1701 (unknown), length 2, 7d4a 353d4a33fee61ecc: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 353d4a33fee61ecc: Extension type: 29016 (enable_time_stamp), length 1, 03 353d4a33fee61ecc: Extension type: 10930 (grease_quic_bit), length 0 353d4a33fee61ecc: Preparing GET on stream 0 for /thrilled-sweet-mewtwo 353d4a33fee61ecc: Sending packet type: 2 (initial), S0, Q1, Version 1, 353d4a33fee61ecc: <353d4a33fee61ecc>, <833eb33db96dcdbc>, Seq: 79658, pl: 439 353d4a33fee61ecc: Token length: 0 353d4a33fee61ecc: Prepared 419 bytes 353d4a33fee61ecc: ping, 1 bytes 353d4a33fee61ecc: crypto_hs, offset 0, length 414: 0100019a0303d506... 353d4a33fee61ecc: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 353d4a33fee61ecc: <353d4a33fee61ecc>, <833eb33db96dcdbc>, Seq: 0, pl: 762 353d4a33fee61ecc: Prepared 742 bytes 353d4a33fee61ecc: stream 0, offset 0, length 28, fin = 1: 474554202f746872... 353d4a33fee61ecc: padding, 711 bytes 353d4a33fee61ecc: Sending 1252 bytes to 193.167.100.100:443 at T=0.001920 (26ae9e88) 353d4a33fee61ecc: Receiving 1200 bytes from 193.167.100.100:443 at T=0.036626 (26af261a) 353d4a33fee61ecc: Receiving packet type: 2 (initial), S0, Q1, Version 1, 353d4a33fee61ecc: <833eb33db96dcdbc>, , Seq: 0, pl: 160 353d4a33fee61ecc: Token length: 0 353d4a33fee61ecc: Decrypted 142 bytes 353d4a33fee61ecc: ack (nb=0), 79658 353d4a33fee61ecc: crypto_hs, offset 0, length 129: 0200007d0303be65... 353d4a33fee61ecc: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 353d4a33fee61ecc: <833eb33db96dcdbc>, , Seq: 1, pl: 210 353d4a33fee61ecc: Decrypted 192 bytes 353d4a33fee61ecc: crypto_hs, offset 0, length 188: 0800008400820010... 353d4a33fee61ecc: Received transport parameter TLS extension (105 bytes): 353d4a33fee61ecc: Extension list (105 bytes): 353d4a33fee61ecc: Extension type: 0 (ocid), length 8, 353d4a33fee61ecc 353d4a33fee61ecc: Extension type: 1 (idle_timeout), length 4, 8000ea60 353d4a33fee61ecc: Extension type: 2 (stateless_reset_token), length 16, cc8cc0758d523d0d726d3992d76e6bf1 353d4a33fee61ecc: Extension type: 4 (initial_max_data), length 4, 80100000 353d4a33fee61ecc: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 353d4a33fee61ecc: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 353d4a33fee61ecc: Extension type: 7 (max_stream_data_uni), length 4, 80100000 353d4a33fee61ecc: Extension type: 8 (max_streams_bidi), length 2, 4080 353d4a33fee61ecc: Extension type: 9 (max_streams_uni), length 2, 4080 353d4a33fee61ecc: Extension type: 10 (ack_delay_exponent), length 1, 03 353d4a33fee61ecc: Extension type: 11 (max_ack_delay), length 1, 19 353d4a33fee61ecc: Extension type: 14 (active_connection_id_limit), length 1, 08 353d4a33fee61ecc: Extension type: 15 (hcid), length 8, a8ad418d62fbbf6c 353d4a33fee61ecc: Extension type: 17 (version_negotiation), length 12, 00000001000000016b3343cf 353d4a33fee61ecc: Extension type: 32 (max_datagram_frame_size), length 4, 80010000 353d4a33fee61ecc: Receiving packet type: 6 (1rtt protected), S0, Q1, 353d4a33fee61ecc: <833eb33db96dcdbc>, Seq: 2 (2), Phi: 0, 353d4a33fee61ecc: Decrypted 752 bytes 353d4a33fee61ecc: crypto_hs, offset 0, length 89: 0400005500015180... 353d4a33fee61ecc: padding, 659 bytes 353d4a33fee61ecc: T= 0.036626, cwin: 15809,flight: 787,nb_ret: 0,rtt_min: 34706,rtt: 34706,rtt_var: 17353,max_ack_delay: 0,state: 10 353d4a33fee61ecc: The session was properly resumed! 353d4a33fee61ecc: Zero RTT data is accepted! 353d4a33fee61ecc: Negotiated ALPN: hq-interop 353d4a33fee61ecc: Sending packet type: 4 (handshake), S0, Q1, Version 1, 353d4a33fee61ecc: , <833eb33db96dcdbc>, Seq: 0, pl: 80 353d4a33fee61ecc: Prepared 60 bytes 353d4a33fee61ecc: ack (nb=0), 1 353d4a33fee61ecc: crypto_hs, offset 0, length 52: 140000300526d825... 353d4a33fee61ecc: Sending packet type: 6 (1rtt protected), S1, Q1, 353d4a33fee61ecc: , Seq: 1 (1), Phi: 0, 353d4a33fee61ecc: Prepared 285 bytes 353d4a33fee61ecc: ack (nb=0), 2 353d4a33fee61ecc: new_connection_id[1]: 0xd6a208c316eab77d, 203d9cb000f54a1b33c7bd80b736000d 353d4a33fee61ecc: new_connection_id[2]: 0xbebb87f867238f1d, b9475dcac3dbdfde2031d71e6c0df6ff 353d4a33fee61ecc: new_connection_id[3]: 0x32f5a58ea57a500f, 17e23de4bf2d6d10eeb33e5bb6993fca 353d4a33fee61ecc: new_connection_id[4]: 0x7c3a9ea859628cfa, 611ae37b067c45eda48db7989f1198c9 353d4a33fee61ecc: new_connection_id[5]: 0x2f4da677be99baad, 3c167a0556a94df933b3c7ff48f37e50 353d4a33fee61ecc: new_connection_id[6]: 0x8a12b84208d71f02, feef295b74912850ce603a0678f3d804 353d4a33fee61ecc: new_connection_id[7]: 0x30e5d19f1b42b334, 1c3266fb99057c3b061aeb7172099cd7 353d4a33fee61ecc: padding, 84 bytes 353d4a33fee61ecc: T= 0.037105, cwin: 15809,flight: 1203,nb_ret: 0,rtt_min: 34706,rtt: 34706,rtt_var: 17353,max_ack_delay: 0,state: 13 353d4a33fee61ecc: Sending 416 bytes to 193.167.100.100:443 at T=0.037105 (26af27f9) 353d4a33fee61ecc: Connection established. Version = 1, I-CID: 353d4a33fee61ecc, verified: 1 353d4a33fee61ecc: Receiving 230 bytes from 193.167.100.100:443 at T=0.068994 (26afa48a) 353d4a33fee61ecc: Receiving packet type: 6 (1rtt protected), S1, Q1, 353d4a33fee61ecc: <833eb33db96dcdbc>, Seq: 3 (3), Phi: 0, 353d4a33fee61ecc: Decrypted 203 bytes 353d4a33fee61ecc: ack (nb=0), 0-1 353d4a33fee61ecc: handshake_done 353d4a33fee61ecc: new_connection_id[1]: 0xddb7877d81f423e4, efd68119710f775d312d21e071e352fc 353d4a33fee61ecc: new_connection_id[2]: 0x371b637976c30c1d, e6d4d52b66e1326330c4785010f7727b 353d4a33fee61ecc: new_connection_id[3]: 0x98f564c2ecde38b8, af207f4dcb3ad3fbf36c2e629137cfe5 353d4a33fee61ecc: new_connection_id[4]: 0x64fb952b800b0f1d, 49559222926fa20cc23a883eab01c8eb 353d4a33fee61ecc: new_connection_id[5]: 0xc369b36719b25a89, c82f39a144f481efba22b27165bf3b21 353d4a33fee61ecc: new_connection_id[6]: 0x2ac247462178ed89, 6db0bc5fe28eceda41151c8a8a8f236b 353d4a33fee61ecc: new_connection_id[7]: 0xb645d766774227fe, 04328f6436507293ffec4cc71966c4d7 353d4a33fee61ecc: T= 0.068994, cwin: 16964,flight: 0,nb_ret: 0,rtt_min: 31889,rtt: 34353,rtt_var: 13719,max_ack_delay: 0,state: 14 353d4a33fee61ecc: Sending packet type: 6 (1rtt protected), S0, Q1, 353d4a33fee61ecc: , Seq: 2 (2), Phi: 0, 353d4a33fee61ecc: Prepared 29 bytes 353d4a33fee61ecc: ack (nb=0), 2-3 353d4a33fee61ecc: padding, 23 bytes 353d4a33fee61ecc: T= 0.073049, cwin: 16964,flight: 55,nb_ret: 0,rtt_min: 31889,rtt: 34353,rtt_var: 13719,max_ack_delay: 0,state: 14 353d4a33fee61ecc: Sending 55 bytes to 193.167.100.100:443 at T=0.073049 (26afb461) 353d4a33fee61ecc: Receiving 29 bytes from 193.167.100.100:443 at T=0.162052 (26b1100c) 353d4a33fee61ecc: Receiving packet type: 6 (1rtt protected), S1, Q1, 353d4a33fee61ecc: <833eb33db96dcdbc>, Seq: 5 (5), Phi: 0, 353d4a33fee61ecc: Decrypted 2 bytes 353d4a33fee61ecc: ping, 1 bytes 353d4a33fee61ecc: padding, 1 bytes 353d4a33fee61ecc: T= 0.162052, cwin: 16964,flight: 55,nb_ret: 0,rtt_min: 31889,rtt: 34353,rtt_var: 13719,max_ack_delay: 0,state: 14 353d4a33fee61ecc: Sending packet type: 6 (1rtt protected), S0, Q1, 353d4a33fee61ecc: , Seq: 3 (3), Phi: 0, 353d4a33fee61ecc: Prepared 29 bytes 353d4a33fee61ecc: ack (nb=1), 5, 2-3 353d4a33fee61ecc: padding, 22 bytes 353d4a33fee61ecc: T= 0.162117, cwin: 16964,flight: 110,nb_ret: 0,rtt_min: 31889,rtt: 34353,rtt_var: 13719,max_ack_delay: 0,state: 14 353d4a33fee61ecc: Sending 55 bytes to 193.167.100.100:443 at T=0.162117 (26b1104d) 353d4a33fee61ecc: Receiving 29 bytes from 193.167.100.100:443 at T=1.444714 (26c4a272) 353d4a33fee61ecc: Receiving packet type: 6 (1rtt protected), S1, Q1, 353d4a33fee61ecc: <833eb33db96dcdbc>, Seq: 8 (8), Phi: 0, 353d4a33fee61ecc: Decrypted 2 bytes 353d4a33fee61ecc: ping, 1 bytes 353d4a33fee61ecc: padding, 1 bytes 353d4a33fee61ecc: T= 1.444714, cwin: 1362,flight: 0,nb_ret: 0,rtt_min: 31889,rtt: 34353,rtt_var: 13719,max_ack_delay: 0,state: 14 353d4a33fee61ecc: Sending packet type: 6 (1rtt protected), S0, Q1, 353d4a33fee61ecc: , Seq: 4 (4), Phi: 0, 353d4a33fee61ecc: Prepared 29 bytes 353d4a33fee61ecc: ack (nb=2), 8, 5, 2-3 353d4a33fee61ecc: padding, 20 bytes 353d4a33fee61ecc: T= 1.444799, cwin: 1362,flight: 55,nb_ret: 0,rtt_min: 31889,rtt: 34353,rtt_var: 13719,max_ack_delay: 0,state: 14 353d4a33fee61ecc: Sending 55 bytes to 193.167.100.100:443 at T=1.444799 (26c4a2c7) 353d4a33fee61ecc: Receiving 1055 bytes from 193.167.100.100:443 at T=1.476777 (26c51fb1) 353d4a33fee61ecc: Receiving packet type: 6 (1rtt protected), S0, Q1, 353d4a33fee61ecc: <833eb33db96dcdbc>, Seq: 9 (9), Phi: 0, 353d4a33fee61ecc: Decrypted 1028 bytes 353d4a33fee61ecc: stream 0, offset 0, length 1024, fin = 1: c4542a908c48923b... 353d4a33fee61ecc: T= 1.476777, cwin: 1362,flight: 55,nb_ret: 0,rtt_min: 31889,rtt: 34353,rtt_var: 13719,max_ack_delay: 0,state: 14 353d4a33fee61ecc: All done, Closing the connection. 353d4a33fee61ecc: Sending packet type: 6 (1rtt protected), S1, Q1, 353d4a33fee61ecc: , Seq: 5 (5), Phi: 0, 353d4a33fee61ecc: Prepared 12 bytes 353d4a33fee61ecc: ack (nb=2), 8-9, 5, 2-3 353d4a33fee61ecc: application_close, Error 0x0000, Reason length 0 353d4a33fee61ecc: Sending 38 bytes to 193.167.100.100:443 at T=1.477004 (26c52094) 353d4a33fee61ecc: Out of 1 zero RTT packets, 1 were acked by the server. 353d4a33fee61ecc: Received 1024 bytes in 1.778946 seconds, 0.004605 Mbps. 353d4a33fee61ecc: Sent 28 bytes in 1.778946 seconds, 0.000126 Mbps.