d8e00f5c14849a52: No root crt list specified -- certificate will not be verified. d8e00f5c14849a52: Sending ALPN list (1): hq-interop d8e00f5c14849a52: Sending transport parameter TLS extension (85 bytes): d8e00f5c14849a52: Extension list (85 bytes): d8e00f5c14849a52: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 d8e00f5c14849a52: Extension type: 4 (initial_max_data), length 4, 80100000 d8e00f5c14849a52: Extension type: 8 (max_streams_bidi), length 2, 4200 d8e00f5c14849a52: Extension type: 1 (idle_timeout), length 4, 8002bf20 d8e00f5c14849a52: Extension type: 3 (max_packet_size), length 2, 45a0 d8e00f5c14849a52: Extension type: 9 (max_streams_uni), length 2, 4200 d8e00f5c14849a52: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 d8e00f5c14849a52: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff d8e00f5c14849a52: Extension type: 14 (active_connection_id_limit), length 1, 08 d8e00f5c14849a52: Extension type: 11 (max_ack_delay), length 1, 0a d8e00f5c14849a52: Extension type: 15 (hcid), length 8, b792fdef02d7adf9 d8e00f5c14849a52: Extension type: 6754 (unknown), length 4, 8000e00f d8e00f5c14849a52: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 d8e00f5c14849a52: Extension type: 29016 (enable_time_stamp), length 1, 03 d8e00f5c14849a52: Extension type: 10930 (grease_quic_bit), length 0 d8e00f5c14849a52: Preparing GET on stream 0 for /ample-steaming-mew d8e00f5c14849a52: Sending packet type: 2 (initial), S0, Q1, Version 1, d8e00f5c14849a52: , , Seq: 108691, pl: 553 d8e00f5c14849a52: Token length: 0 d8e00f5c14849a52: Prepared 533 bytes d8e00f5c14849a52: ping, 1 bytes d8e00f5c14849a52: crypto_hs, offset 0, length 528: 0100020c03037a9c... d8e00f5c14849a52: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d8e00f5c14849a52: , , Seq: 0, pl: 648 d8e00f5c14849a52: Prepared 628 bytes d8e00f5c14849a52: stream 0, offset 0, length 25, fin = 1: 474554202f616d70... d8e00f5c14849a52: padding, 600 bytes d8e00f5c14849a52: Sending 1252 bytes to 193.167.100.100:443 at T=0.001948 (2dfd722a) d8e00f5c14849a52: T= 0.252252, Lost packet type 2, number 108691, size 563, DCID <>, reason: timer d8e00f5c14849a52: Sending packet type: 2 (initial), S0, Q1, Version 1, d8e00f5c14849a52: , , Seq: 108692, pl: 553 d8e00f5c14849a52: Token length: 0 d8e00f5c14849a52: Prepared 533 bytes d8e00f5c14849a52: ping, 1 bytes d8e00f5c14849a52: crypto_hs, offset 0, length 528: 0100020c03037a9c... d8e00f5c14849a52: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, d8e00f5c14849a52: , , Seq: 1, pl: 648 d8e00f5c14849a52: Prepared 628 bytes d8e00f5c14849a52: padding, 628 bytes d8e00f5c14849a52: Sending 1252 bytes to 193.167.100.100:443 at T=0.252252 (2e0143ea) d8e00f5c14849a52: Receiving 216 bytes from 193.167.100.100:443 at T=0.285661 (2e01c66b) d8e00f5c14849a52: T= 0.285661, Keys unavailable, buffered packet type 4. d8e00f5c14849a52: Receiving 48 bytes from 193.167.100.100:443 at T=0.285730 (2e01c6b0) d8e00f5c14849a52: T= 0.285730, Keys unavailable, buffered packet type 6. d8e00f5c14849a52: Receiving 1232 bytes from 193.167.100.100:443 at T=0.396008 (2e037576) d8e00f5c14849a52: Receiving packet type: 2 (initial), S0, Q1, Version 1, d8e00f5c14849a52: , <4000005e7eeae938>, Seq: 3745508, pl: 1206 d8e00f5c14849a52: Token length: 0 d8e00f5c14849a52: Decrypted 1187 bytes d8e00f5c14849a52: crypto_hs, offset 0, length 96: 0200005c0303cb67... d8e00f5c14849a52: padding, 1 bytes d8e00f5c14849a52: ack (nb=0), 108692 d8e00f5c14849a52: padding, 1077 bytes d8e00f5c14849a52: Receiving 216 bytes from 193.167.100.100:443 at T=0.396384 (2e0376ee) d8e00f5c14849a52: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d8e00f5c14849a52: , <4000005e7eeae938>, Seq: 3745508, pl: 191 d8e00f5c14849a52: Decrypted 172 bytes d8e00f5c14849a52: crypto_hs, offset 0, length 168: 08000080007e0010... d8e00f5c14849a52: Received transport parameter TLS extension (101 bytes): d8e00f5c14849a52: Extension list (101 bytes): d8e00f5c14849a52: Extension type: 0 (ocid), length 8, d8e00f5c14849a52 d8e00f5c14849a52: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 d8e00f5c14849a52: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 d8e00f5c14849a52: Extension type: 7 (max_stream_data_uni), length 4, 86666666 d8e00f5c14849a52: Extension type: 4 (initial_max_data), length 4, 86666666 d8e00f5c14849a52: Extension type: 8 (max_streams_bidi), length 2, 4064 d8e00f5c14849a52: Extension type: 9 (max_streams_uni), length 2, 4064 d8e00f5c14849a52: Extension type: 1 (idle_timeout), length 4, 8000ea60 d8e00f5c14849a52: Extension type: 10 (ack_delay_exponent), length 1, 03 d8e00f5c14849a52: Extension type: 3 (max_packet_size), length 2, 45dc d8e00f5c14849a52: Extension type: 2 (stateless_reset_token), length 16, 64ab880ac9863c9e7fb3ca670348cbc9 d8e00f5c14849a52: Extension type: 15 (hcid), length 8, 4000005e7eeae938 d8e00f5c14849a52: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff d8e00f5c14849a52: Extension type: 267427841 (unknown), length 1, 00 d8e00f5c14849a52: Extension type: 20856 (unknown), length 1, 01 d8e00f5c14849a52: The session was properly resumed! d8e00f5c14849a52: Zero RTT data is accepted! d8e00f5c14849a52: Negotiated ALPN: hq-interop d8e00f5c14849a52: Receiving 48 bytes from 193.167.100.100:443 at T=0.396596 (2e0377c2) d8e00f5c14849a52: Receiving packet type: 6 (1rtt protected), S0, Q1, d8e00f5c14849a52: , Seq: 3745506 (3745506), Phi: 0, d8e00f5c14849a52: Decrypted 20 bytes d8e00f5c14849a52: ack (nb=0), 1 d8e00f5c14849a52: padding, 14 bytes d8e00f5c14849a52: T= 0.396596, cwin: 16580,flight: 673,nb_ret: 1,rtt_min: 143756,rtt: 252474,rtt_var: 137843,max_ack_delay: 0,state: 10 d8e00f5c14849a52: Receiving 216 bytes from 193.167.100.100:443 at T=0.396596 (2e0377c2) d8e00f5c14849a52: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d8e00f5c14849a52: , <4000005e7eeae938>, Seq: 3745506, pl: 191 d8e00f5c14849a52: Decrypted 172 bytes d8e00f5c14849a52: crypto_hs, offset 0, length 168: 08000080007e0010... d8e00f5c14849a52: Sending packet type: 4 (handshake), S0, Q1, Version 1, d8e00f5c14849a52: <4000005e7eeae938>, , Seq: 0, pl: 69 d8e00f5c14849a52: Prepared 49 bytes d8e00f5c14849a52: ack (nb=1), 3745508, 3745506 d8e00f5c14849a52: crypto_hs, offset 0, length 36: 1400002095ff6d57... d8e00f5c14849a52: T= 0.396596, Lost packet type 5, number 0, size 657, DCID <4000005e7eeae938>, reason: repeat d8e00f5c14849a52: Sending packet type: 6 (1rtt protected), S1, Q1, d8e00f5c14849a52: <4000005e7eeae938>, Seq: 2 (2), Phi: 0, d8e00f5c14849a52: Prepared 157 bytes d8e00f5c14849a52: ack (nb=0), 3745506 d8e00f5c14849a52: new_connection_id[1]: 0xc7669de430d549e1, fc7ba820c90aaa88531a31230030bf98 d8e00f5c14849a52: stream 0, offset 0, length 25, fin = 1: 474554202f616d70... d8e00f5c14849a52: padding, 92 bytes d8e00f5c14849a52: T= 0.396596, cwin: 16580,flight: 277,nb_ret: 2,rtt_min: 143756,rtt: 252474,rtt_var: 137843,max_ack_delay: 0,state: 13 d8e00f5c14849a52: Sending 277 bytes to 193.167.100.100:443 at T=0.396596 (2e0377c2) d8e00f5c14849a52: Connection established. Version = 1, I-CID: d8e00f5c14849a52, verified: 1 d8e00f5c14849a52: Receiving 47 bytes from 193.167.100.100:443 at T=0.427957 (2e03f243) d8e00f5c14849a52: Receiving packet type: 4 (handshake), S0, Q1, Version 1, d8e00f5c14849a52: , <4000005e7eeae938>, Seq: 229, pl: 23 d8e00f5c14849a52: Decrypted 6 bytes d8e00f5c14849a52: ack (nb=0), 0 d8e00f5c14849a52: Receiving 432 bytes from 193.167.100.100:443 at T=0.428324 (2e03f3b2) d8e00f5c14849a52: Receiving packet type: 6 (1rtt protected), S0, Q1, d8e00f5c14849a52: , Seq: 3745507 (3745507), Phi: 0, d8e00f5c14849a52: Decrypted 404 bytes d8e00f5c14849a52: crypto_hs, offset 0, length 250: 040000f600000e10... d8e00f5c14849a52: ack (nb=0), 1-2 d8e00f5c14849a52: handshake_done d8e00f5c14849a52: new_connection_id[1]: 0x40000051ed3a6bdc, 4dd233398dd6f070d329f2287d72054e d8e00f5c14849a52: new_connection_id[2]: 0x40000053b56a249b, cbf7c66a4e0dc0fbf7542d3dcc77279b d8e00f5c14849a52: new_connection_id[3]: 0x4000005051469464, a494845265021cfa360a135469723efc d8e00f5c14849a52: new_connection_id[4]: 0x4000004a6016dcbe, c21f1779377f98934d7e5fbf682fb356 d8e00f5c14849a52: padding, 31 bytes d8e00f5c14849a52: T= 0.428324, cwin: 16825,flight: 0,nb_ret: 2,rtt_min: 31361,rtt: 200695,rtt_var: 167271,max_ack_delay: 0,state: 14 d8e00f5c14849a52: Receiving 1072 bytes from 193.167.100.100:443 at T=0.429212 (2e03f72a) d8e00f5c14849a52: Receiving packet type: 6 (1rtt protected), S0, Q1, d8e00f5c14849a52: , Seq: 3745508 (3745508), Phi: 0, d8e00f5c14849a52: Decrypted 1044 bytes d8e00f5c14849a52: stream 0, offset 0, length 1024, fin = 1: 1865c32a5bf6c9e2... d8e00f5c14849a52: padding, 16 bytes d8e00f5c14849a52: T= 0.429212, cwin: 16825,flight: 0,nb_ret: 2,rtt_min: 31361,rtt: 200695,rtt_var: 167271,max_ack_delay: 0,state: 14 d8e00f5c14849a52: All done, Closing the connection. d8e00f5c14849a52: Sending packet type: 6 (1rtt protected), S1, Q1, d8e00f5c14849a52: <4000005e7eeae938>, Seq: 3 (3), Phi: 0, d8e00f5c14849a52: Prepared 11 bytes d8e00f5c14849a52: ack (nb=0), 3745506-3745508 d8e00f5c14849a52: application_close, Error 0x0000, Reason length 0 d8e00f5c14849a52: Sending 37 bytes to 193.167.100.100:443 at T=0.429359 (2e03f7bd) d8e00f5c14849a52: Receiving 402 bytes from 193.167.100.100:443 at T=0.528195 (2e0579d1) d8e00f5c14849a52: Receiving packet type: 6 (1rtt protected), S0, Q1, d8e00f5c14849a52: , Seq: 3745511 (3745511), Phi: 0, d8e00f5c14849a52: Decrypted 374 bytes d8e00f5c14849a52: crypto_hs, offset 0, length 250: 040000f600000e10... d8e00f5c14849a52: handshake_done d8e00f5c14849a52: new_connection_id[1]: 0x40000051ed3a6bdc, 4dd233398dd6f070d329f2287d72054e d8e00f5c14849a52: new_connection_id[2]: 0x40000053b56a249b, cbf7c66a4e0dc0fbf7542d3dcc77279b d8e00f5c14849a52: new_connection_id[3]: 0x4000005051469464, a494845265021cfa360a135469723efc d8e00f5c14849a52: new_connection_id[4]: 0x4000004a6016dcbe, c21f1779377f98934d7e5fbf682fb356 d8e00f5c14849a52: padding, 1 bytes d8e00f5c14849a52: ack (nb=0), 1-2 d8e00f5c14849a52: Receiving 404 bytes from 193.167.100.100:443 at T=0.728286 (2e08876c) d8e00f5c14849a52: Receiving packet type: 6 (1rtt protected), S0, Q1, d8e00f5c14849a52: , Seq: 3745513 (3745513), Phi: 0, d8e00f5c14849a52: Decrypted 376 bytes d8e00f5c14849a52: crypto_hs, offset 0, length 250: 040000f600000e10... d8e00f5c14849a52: handshake_done d8e00f5c14849a52: new_connection_id[1]: 0x40000051ed3a6bdc, 4dd233398dd6f070d329f2287d72054e d8e00f5c14849a52: new_connection_id[2]: 0x40000053b56a249b, cbf7c66a4e0dc0fbf7542d3dcc77279b d8e00f5c14849a52: new_connection_id[3]: 0x4000005051469464, a494845265021cfa360a135469723efc d8e00f5c14849a52: new_connection_id[4]: 0x4000004a6016dcbe, c21f1779377f98934d7e5fbf682fb356 d8e00f5c14849a52: padding, 1 bytes d8e00f5c14849a52: ack (nb=0), 1-2 d8e00f5c14849a52: Sending packet type: 6 (1rtt protected), S1, Q1, d8e00f5c14849a52: <4000005e7eeae938>, Seq: 4 (4), Phi: 0, d8e00f5c14849a52: Prepared 3 bytes d8e00f5c14849a52: application_close, Error 0x0000, Reason length 0 d8e00f5c14849a52: Sending 29 bytes to 193.167.100.100:443 at T=0.728417 (2e0887ef) d8e00f5c14849a52: Receiving 404 bytes from 193.167.100.100:443 at T=0.728576 (2e08888e) d8e00f5c14849a52: Receiving packet type: 6 (1rtt protected), S0, Q1, d8e00f5c14849a52: , Seq: 3745514 (3745514), Phi: 0, d8e00f5c14849a52: Decrypted 376 bytes d8e00f5c14849a52: crypto_hs, offset 0, length 250: 040000f600000e10... d8e00f5c14849a52: handshake_done d8e00f5c14849a52: new_connection_id[1]: 0x40000051ed3a6bdc, 4dd233398dd6f070d329f2287d72054e d8e00f5c14849a52: new_connection_id[2]: 0x40000053b56a249b, cbf7c66a4e0dc0fbf7542d3dcc77279b d8e00f5c14849a52: new_connection_id[3]: 0x4000005051469464, a494845265021cfa360a135469723efc d8e00f5c14849a52: new_connection_id[4]: 0x4000004a6016dcbe, c21f1779377f98934d7e5fbf682fb356 d8e00f5c14849a52: padding, 1 bytes d8e00f5c14849a52: ack (nb=0), 1-2 d8e00f5c14849a52: Out of 2 zero RTT packets, 1 were acked by the server. d8e00f5c14849a52: Received 1024 bytes in 2.613921 seconds, 0.003134 Mbps. d8e00f5c14849a52: Sent 25 bytes in 2.613921 seconds, 0.000077 Mbps.