4d119f828dad443c: No root crt list specified -- certificate will not be verified. 4d119f828dad443c: Sending ALPN list (1): hq-interop 4d119f828dad443c: Sending transport parameter TLS extension (83 bytes): 4d119f828dad443c: Extension list (83 bytes): 4d119f828dad443c: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 4d119f828dad443c: Extension type: 4 (initial_max_data), length 4, 80100000 4d119f828dad443c: Extension type: 8 (max_streams_bidi), length 2, 4200 4d119f828dad443c: Extension type: 1 (idle_timeout), length 4, 8002bf20 4d119f828dad443c: Extension type: 3 (max_packet_size), length 2, 45a0 4d119f828dad443c: Extension type: 9 (max_streams_uni), length 2, 4200 4d119f828dad443c: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 4d119f828dad443c: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 4d119f828dad443c: Extension type: 14 (active_connection_id_limit), length 1, 08 4d119f828dad443c: Extension type: 11 (max_ack_delay), length 1, 0a 4d119f828dad443c: Extension type: 15 (hcid), length 8, 3d6a57f991c659f3 4d119f828dad443c: Extension type: 2445 (unknown), length 2, 519f 4d119f828dad443c: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 4d119f828dad443c: Extension type: 29016 (enable_time_stamp), length 1, 03 4d119f828dad443c: Extension type: 10930 (grease_quic_bit), length 0 4d119f828dad443c: Preparing GET on stream 0 for /merciless-numerous-gpu 4d119f828dad443c: Sending packet type: 2 (initial), S0, Q1, Version 1, 4d119f828dad443c: <4d119f828dad443c>, <3d6a57f991c659f3>, Seq: 66126, pl: 615 4d119f828dad443c: Token length: 37, Token: b7df6a043a0bee814a959b3d9c36ed76... 4d119f828dad443c: Prepared 595 bytes 4d119f828dad443c: ping, 1 bytes 4d119f828dad443c: crypto_hs, offset 0, length 590: 0100024a03033876... 4d119f828dad443c: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 4d119f828dad443c: <4d119f828dad443c>, <3d6a57f991c659f3>, Seq: 0, pl: 549 4d119f828dad443c: Prepared 529 bytes 4d119f828dad443c: stream 0, offset 0, length 29, fin = 1: 474554202f6d6572... 4d119f828dad443c: padding, 497 bytes 4d119f828dad443c: Sending 1252 bytes to 193.167.100.100:443 at T=0.001838 (18f3bf56) 4d119f828dad443c: T= 0.252140, Lost packet type 2, number 66126, size 662, DCID <>, reason: timer 4d119f828dad443c: Sending packet type: 2 (initial), S0, Q1, Version 1, 4d119f828dad443c: <4d119f828dad443c>, <3d6a57f991c659f3>, Seq: 66127, pl: 615 4d119f828dad443c: Token length: 37, Token: b7df6a043a0bee814a959b3d9c36ed76... 4d119f828dad443c: Prepared 595 bytes 4d119f828dad443c: ping, 1 bytes 4d119f828dad443c: crypto_hs, offset 0, length 590: 0100024a03033876... 4d119f828dad443c: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 4d119f828dad443c: <4d119f828dad443c>, <3d6a57f991c659f3>, Seq: 1, pl: 549 4d119f828dad443c: Prepared 529 bytes 4d119f828dad443c: padding, 529 bytes 4d119f828dad443c: Sending 1252 bytes to 193.167.100.100:443 at T=0.252140 (18f79114) 4d119f828dad443c: Receiving 1200 bytes from 193.167.100.100:443 at T=0.287044 (18f8196c) 4d119f828dad443c: Receiving packet type: 2 (initial), S0, Q1, Version 1, 4d119f828dad443c: <3d6a57f991c659f3>, , Seq: 0, pl: 159 4d119f828dad443c: Token length: 0 4d119f828dad443c: Decrypted 142 bytes 4d119f828dad443c: ack (nb=0), 66127 4d119f828dad443c: crypto_hs, offset 0, length 129: 0200007d0303d107... 4d119f828dad443c: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4d119f828dad443c: <3d6a57f991c659f3>, , Seq: 0, pl: 990 4d119f828dad443c: Decrypted 973 bytes 4d119f828dad443c: crypto_hs, offset 0, length 199: 0800008f008d0000... 4d119f828dad443c: padding, 770 bytes 4d119f828dad443c: Received transport parameter TLS extension (98 bytes): 4d119f828dad443c: Extension list (98 bytes): 4d119f828dad443c: Extension type: 0 (ocid), length 8, 4d119f828dad443c 4d119f828dad443c: Extension type: 2 (stateless_reset_token), length 16, fa31cd9e1e93f52ec66c5008ee8cf7e0 4d119f828dad443c: Extension type: 15 (hcid), length 8, c30a634956dc8416 4d119f828dad443c: Extension type: 1 (idle_timeout), length 4, 80007530 4d119f828dad443c: Extension type: 3 (max_packet_size), length 2, 4800 4d119f828dad443c: Extension type: 4 (initial_max_data), length 4, 8018fe70 4d119f828dad443c: Extension type: 5 (max_stream_data_bidi_local), length 2, 7ffc 4d119f828dad443c: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80167e98 4d119f828dad443c: Extension type: 7 (max_stream_data_uni), length 2, 7ffc 4d119f828dad443c: Extension type: 8 (max_streams_bidi), length 2, 4064 4d119f828dad443c: Extension type: 9 (max_streams_uni), length 1, 03 4d119f828dad443c: Extension type: 12 (disable_migration), length 0 4d119f828dad443c: Extension type: 14 (active_connection_id_limit), length 1, 08 4d119f828dad443c: Extension type: 17 (version_negotiation), length 16, 00000001ff00001d000000016b3343cf 4d119f828dad443c: The session was properly resumed! 4d119f828dad443c: Zero RTT data is accepted! 4d119f828dad443c: Negotiated ALPN: hq-interop 4d119f828dad443c: Sending packet type: 4 (handshake), S0, Q1, Version 1, 4d119f828dad443c: , <3d6a57f991c659f3>, Seq: 0, pl: 80 4d119f828dad443c: Prepared 60 bytes 4d119f828dad443c: ack (nb=0), 0 4d119f828dad443c: crypto_hs, offset 0, length 52: 1400003066721988... 4d119f828dad443c: T= 0.287400, Lost packet type 5, number 0, size 558, DCID , reason: timer 4d119f828dad443c: Sending packet type: 6 (1rtt protected), S0, Q1, 4d119f828dad443c: , Seq: 2 (2), Phi: 0, 4d119f828dad443c: Prepared 285 bytes 4d119f828dad443c: new_connection_id[1]: 0xd72132cc306dab97, 9deb54616c3e058920cca97f92c58ffb 4d119f828dad443c: new_connection_id[2]: 0x332aeaa056b88dcd, 5755122acdcd1b534f15a9a9da558544 4d119f828dad443c: new_connection_id[3]: 0x3dd03cb5b45c8ae5, a5cc775064e4ce4e1a982d98541bbbab 4d119f828dad443c: new_connection_id[4]: 0x9f831d6b21b97774, 4a9f686d9a3f7b4c1a3779ba49301ad9 4d119f828dad443c: new_connection_id[5]: 0xb74ffdf1b91f4658, 32fa5752e96fc1709c69765417bab6cd 4d119f828dad443c: new_connection_id[6]: 0x8d5b9b17e3131d7b, 214df46a8295914cc24652331bbd700c 4d119f828dad443c: new_connection_id[7]: 0xcb0b9afe7dbe3b68, 619c41134ec38ee483a21e83868fec9d 4d119f828dad443c: stream 0, offset 0, length 29, fin = 1: 474554202f6d6572... 4d119f828dad443c: padding, 57 bytes 4d119f828dad443c: T= 0.287400, cwin: 16022,flight: 990,nb_ret: 2,rtt_min: 34904,rtt: 34904,rtt_var: 17452,max_ack_delay: 0,state: 13 4d119f828dad443c: Sending 416 bytes to 193.167.100.100:443 at T=0.287400 (18f81ad0) 4d119f828dad443c: Connection established. Version = 1, I-CID: 4d119f828dad443c, verified: 1 4d119f828dad443c: T= 0.374790, Lost packet type 4, number 0, size 89, DCID , reason: timer 4d119f828dad443c: Sending packet type: 4 (handshake), S0, Q1, Version 1, 4d119f828dad443c: , <3d6a57f991c659f3>, Seq: 1, pl: 158 4d119f828dad443c: Prepared 138 bytes 4d119f828dad443c: crypto_hs, offset 0, length 52: 1400003066721988... 4d119f828dad443c: ack (nb=0), 0 4d119f828dad443c: padding, 77 bytes 4d119f828dad443c: T= 0.374790, cwin: 16022,flight: 1068,nb_ret: 3,rtt_min: 34904,rtt: 34904,rtt_var: 17452,max_ack_delay: 0,state: 13 4d119f828dad443c: Sending 183 bytes to 193.167.100.100:443 at T=0.374790 (18f9702e) 4d119f828dad443c: Receiving 349 bytes from 193.167.100.100:443 at T=0.407750 (18f9f0ee) 4d119f828dad443c: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 4d119f828dad443c: <3d6a57f991c659f3>, , Seq: 1, pl: 22 4d119f828dad443c: Decrypted 5 bytes 4d119f828dad443c: ack (nb=0), 1 4d119f828dad443c: Receiving packet type: 6 (1rtt protected), S0, Q1, 4d119f828dad443c: <3d6a57f991c659f3>, Seq: 0 (0), Phi: 0, 4d119f828dad443c: Decrypted 277 bytes 4d119f828dad443c: crypto_hs, offset 0, length 273: 0400010d00001c20... 4d119f828dad443c: T= 0.407750, cwin: 16189,flight: 885,nb_ret: 3,rtt_min: 32960,rtt: 34661,rtt_var: 13575,max_ack_delay: 0,state: 13 4d119f828dad443c: T= 0.407896, Lost packet type 5, number 1, size 558, DCID , reason: timer 4d119f828dad443c: T= 0.407896, Lost packet type 6, number 2, size 295, DCID , reason: timer 4d119f828dad443c: Sending packet type: 6 (1rtt protected), S1, Q1, 4d119f828dad443c: , Seq: 3 (3), Phi: 0, 4d119f828dad443c: Prepared 285 bytes 4d119f828dad443c: new_connection_id[1]: 0xd72132cc306dab97, 9deb54616c3e058920cca97f92c58ffb 4d119f828dad443c: new_connection_id[2]: 0x332aeaa056b88dcd, 5755122acdcd1b534f15a9a9da558544 4d119f828dad443c: new_connection_id[3]: 0x3dd03cb5b45c8ae5, a5cc775064e4ce4e1a982d98541bbbab 4d119f828dad443c: new_connection_id[4]: 0x9f831d6b21b97774, 4a9f686d9a3f7b4c1a3779ba49301ad9 4d119f828dad443c: new_connection_id[5]: 0xb74ffdf1b91f4658, 32fa5752e96fc1709c69765417bab6cd 4d119f828dad443c: new_connection_id[6]: 0x8d5b9b17e3131d7b, 214df46a8295914cc24652331bbd700c 4d119f828dad443c: new_connection_id[7]: 0xcb0b9afe7dbe3b68, 619c41134ec38ee483a21e83868fec9d 4d119f828dad443c: ack (nb=0), 0 4d119f828dad443c: stream 0, offset 0, length 29, fin = 1: 474554202f6d6572... 4d119f828dad443c: padding, 52 bytes 4d119f828dad443c: T= 0.407896, cwin: 16189,flight: 311,nb_ret: 5,rtt_min: 32960,rtt: 34661,rtt_var: 13575,max_ack_delay: 0,state: 13 4d119f828dad443c: Sending 311 bytes to 193.167.100.100:443 at T=0.407896 (18f9f180) 4d119f828dad443c: Receiving 150 bytes from 193.167.100.100:443 at T=0.408252 (18f9f2e4) 4d119f828dad443c: Receiving packet type: 6 (1rtt protected), S0, Q1, 4d119f828dad443c: <3d6a57f991c659f3>, Seq: 1 (1), Phi: 0, 4d119f828dad443c: Decrypted 124 bytes 4d119f828dad443c: handshake_done 4d119f828dad443c: new_token[37]: 0xb7a6339f1cafcb777602f7b27bd7faf7... 4d119f828dad443c: new_connection_id[1]: 0x902799f397ff627b, 087d5353a0e972dbbb4f4ec07a523de6 4d119f828dad443c: new_connection_id[2]: 0x2200d45187576422, 91b03f9d7fcb863debe5ad0e7193ba9a 4d119f828dad443c: new_connection_id[3]: 0xa18b5ba11594076d, e561b43784a87e7fc3bb0a7950d57d91 4d119f828dad443c: T= 0.408252, cwin: 16189,flight: 311,nb_ret: 5,rtt_min: 32960,rtt: 34661,rtt_var: 13575,max_ack_delay: 0,state: 14 4d119f828dad443c: Sending packet type: 6 (1rtt protected), S1, Q1, 4d119f828dad443c: , Seq: 4 (4), Phi: 0, 4d119f828dad443c: Prepared 29 bytes 4d119f828dad443c: ack (nb=0), 0-1 4d119f828dad443c: padding, 23 bytes 4d119f828dad443c: T= 0.412443, cwin: 16189,flight: 366,nb_ret: 5,rtt_min: 32960,rtt: 34661,rtt_var: 13575,max_ack_delay: 0,state: 14 4d119f828dad443c: Sending 55 bytes to 193.167.100.100:443 at T=0.412443 (18fa0343) 4d119f828dad443c: Receiving 1062 bytes from 193.167.100.100:443 at T=0.441660 (18fa7564) 4d119f828dad443c: Receiving packet type: 6 (1rtt protected), S1, Q1, 4d119f828dad443c: <3d6a57f991c659f3>, Seq: 2 (2), Phi: 0, 4d119f828dad443c: Decrypted 1036 bytes 4d119f828dad443c: ack (nb=1), 3, 1 4d119f828dad443c: stream 0, offset 0, length 1024, fin = 1: 51b7b8421739fc74... 4d119f828dad443c: T= 0.441660, cwin: 16484,flight: 55,nb_ret: 5,rtt_min: 32960,rtt: 34548,rtt_var: 10405,max_ack_delay: 0,state: 14 4d119f828dad443c: All done, Closing the connection. 4d119f828dad443c: Sending packet type: 6 (1rtt protected), S0, Q1, 4d119f828dad443c: , Seq: 5 (5), Phi: 0, 4d119f828dad443c: Prepared 8 bytes 4d119f828dad443c: ack (nb=0), 1-2 4d119f828dad443c: application_close, Error 0x0000, Reason length 0 4d119f828dad443c: Sending 34 bytes to 193.167.100.100:443 at T=0.441861 (18fa762d) 4d119f828dad443c: Out of 2 zero RTT packets, 0 were acked by the server. 4d119f828dad443c: Received 1024 bytes in 0.714550 seconds, 0.011465 Mbps. 4d119f828dad443c: Sent 29 bytes in 0.714550 seconds, 0.000325 Mbps.