e4a4187047d1169c: No root crt list specified -- certificate will not be verified. e4a4187047d1169c: Sending ALPN list (1): hq-interop e4a4187047d1169c: Sending transport parameter TLS extension (85 bytes): e4a4187047d1169c: Extension list (85 bytes): e4a4187047d1169c: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 e4a4187047d1169c: Extension type: 4 (initial_max_data), length 4, 80100000 e4a4187047d1169c: Extension type: 8 (max_streams_bidi), length 2, 4200 e4a4187047d1169c: Extension type: 1 (idle_timeout), length 4, 8002bf20 e4a4187047d1169c: Extension type: 3 (max_packet_size), length 2, 45a0 e4a4187047d1169c: Extension type: 9 (max_streams_uni), length 2, 4200 e4a4187047d1169c: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 e4a4187047d1169c: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff e4a4187047d1169c: Extension type: 14 (active_connection_id_limit), length 1, 08 e4a4187047d1169c: Extension type: 11 (max_ack_delay), length 1, 0a e4a4187047d1169c: Extension type: 15 (hcid), length 8, fd0d76ab41e99d63 e4a4187047d1169c: Extension type: 7126 (unknown), length 4, 8000a418 e4a4187047d1169c: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 e4a4187047d1169c: Extension type: 29016 (enable_time_stamp), length 1, 03 e4a4187047d1169c: Extension type: 10930 (grease_quic_bit), length 0 e4a4187047d1169c: Preparing GET on stream 0 for /ograbemcfi e4a4187047d1169c: Sending packet type: 2 (initial), S0, Q1, Version 1, e4a4187047d1169c: , , Seq: 109021, pl: 553 e4a4187047d1169c: Token length: 0 e4a4187047d1169c: Prepared 533 bytes e4a4187047d1169c: ping, 1 bytes e4a4187047d1169c: crypto_hs, offset 0, length 528: 0100020c030334a2... e4a4187047d1169c: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, e4a4187047d1169c: , , Seq: 0, pl: 648 e4a4187047d1169c: Prepared 628 bytes e4a4187047d1169c: stream 0, offset 0, length 17, fin = 1: 474554202f6f6772... e4a4187047d1169c: padding, 608 bytes e4a4187047d1169c: Sending 1252 bytes to 193.167.100.100:443 at T=0.001956 (39ad11ac) e4a4187047d1169c: Receiving 216 bytes from 193.167.100.100:443 at T=0.035583 (39ad9507) e4a4187047d1169c: T= 0.035583, Keys unavailable, buffered packet type 4. e4a4187047d1169c: Receiving 48 bytes from 193.167.100.100:443 at T=0.035625 (39ad9531) e4a4187047d1169c: T= 0.035625, Keys unavailable, buffered packet type 6. e4a4187047d1169c: Receiving 1072 bytes from 193.167.100.100:443 at T=0.036413 (39ad9845) e4a4187047d1169c: T= 0.036413, Keys unavailable, buffered packet type 6. e4a4187047d1169c: T= 0.091023, Lost packet type 2, number 109021, size 563, DCID <>, reason: timer e4a4187047d1169c: Sending packet type: 2 (initial), S0, Q1, Version 1, e4a4187047d1169c: , , Seq: 109022, pl: 553 e4a4187047d1169c: Token length: 0 e4a4187047d1169c: Prepared 533 bytes e4a4187047d1169c: ping, 1 bytes e4a4187047d1169c: crypto_hs, offset 0, length 528: 0100020c030334a2... e4a4187047d1169c: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, e4a4187047d1169c: , , Seq: 1, pl: 648 e4a4187047d1169c: Prepared 628 bytes e4a4187047d1169c: padding, 628 bytes e4a4187047d1169c: Sending 1252 bytes to 193.167.100.100:443 at T=0.091023 (39ae6d97) e4a4187047d1169c: Receiving 1232 bytes from 193.167.100.100:443 at T=0.145964 (39af4434) e4a4187047d1169c: Receiving packet type: 2 (initial), S0, Q1, Version 1, e4a4187047d1169c: , <400000d5f8f6c04a>, Seq: 1593901, pl: 1206 e4a4187047d1169c: Token length: 0 e4a4187047d1169c: Decrypted 1187 bytes e4a4187047d1169c: crypto_hs, offset 0, length 96: 0200005c0303943f... e4a4187047d1169c: padding, 1 bytes e4a4187047d1169c: ack (nb=0), 109021 e4a4187047d1169c: padding, 1077 bytes e4a4187047d1169c: Receiving 216 bytes from 193.167.100.100:443 at T=0.146351 (39af45b7) e4a4187047d1169c: Receiving packet type: 4 (handshake), S0, Q1, Version 1, e4a4187047d1169c: , <400000d5f8f6c04a>, Seq: 1593901, pl: 191 e4a4187047d1169c: Decrypted 172 bytes e4a4187047d1169c: crypto_hs, offset 0, length 168: 08000080007e0010... e4a4187047d1169c: Received transport parameter TLS extension (101 bytes): e4a4187047d1169c: Extension list (101 bytes): e4a4187047d1169c: Extension type: 0 (ocid), length 8, e4a4187047d1169c e4a4187047d1169c: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 e4a4187047d1169c: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 e4a4187047d1169c: Extension type: 7 (max_stream_data_uni), length 4, 86666666 e4a4187047d1169c: Extension type: 4 (initial_max_data), length 4, 86666666 e4a4187047d1169c: Extension type: 8 (max_streams_bidi), length 2, 4064 e4a4187047d1169c: Extension type: 9 (max_streams_uni), length 2, 4064 e4a4187047d1169c: Extension type: 1 (idle_timeout), length 4, 8000ea60 e4a4187047d1169c: Extension type: 10 (ack_delay_exponent), length 1, 03 e4a4187047d1169c: Extension type: 3 (max_packet_size), length 2, 45dc e4a4187047d1169c: Extension type: 2 (stateless_reset_token), length 16, 17411fddd6644c7eb43578199ec2b335 e4a4187047d1169c: Extension type: 15 (hcid), length 8, 400000d5f8f6c04a e4a4187047d1169c: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff e4a4187047d1169c: Extension type: 267427841 (unknown), length 1, 00 e4a4187047d1169c: Extension type: 20856 (unknown), length 1, 01 e4a4187047d1169c: The session was properly resumed! e4a4187047d1169c: Zero RTT data is accepted! e4a4187047d1169c: Negotiated ALPN: hq-interop e4a4187047d1169c: Receiving 1072 bytes from 193.167.100.100:443 at T=0.146567 (39af468f) e4a4187047d1169c: Receiving packet type: 6 (1rtt protected), S0, Q1, e4a4187047d1169c: , Seq: 1593900 (1593900), Phi: 0, e4a4187047d1169c: Decrypted 1044 bytes e4a4187047d1169c: stream 0, offset 0, length 1024, fin = 1: aafff3a4ee2349bc... e4a4187047d1169c: padding, 16 bytes e4a4187047d1169c: T= 0.146567, cwin: 15923,flight: 1925,nb_ret: 1,rtt_min: 35583,rtt: 49136,rtt_var: 40449,max_ack_delay: 0,state: 10 e4a4187047d1169c: Receiving 48 bytes from 193.167.100.100:443 at T=0.146567 (39af468f) e4a4187047d1169c: Receiving packet type: 6 (1rtt protected), S0, Q1, e4a4187047d1169c: , Seq: 1593899 (1593899), Phi: 0, e4a4187047d1169c: Decrypted 20 bytes e4a4187047d1169c: ack (nb=0), 0 e4a4187047d1169c: padding, 14 bytes e4a4187047d1169c: T= 0.146567, cwin: 16580,flight: 1252,nb_ret: 1,rtt_min: 35583,rtt: 61070,rtt_var: 54205,max_ack_delay: 0,state: 10 e4a4187047d1169c: Receiving 216 bytes from 193.167.100.100:443 at T=0.146567 (39af468f) e4a4187047d1169c: Receiving packet type: 4 (handshake), S0, Q1, Version 1, e4a4187047d1169c: , <400000d5f8f6c04a>, Seq: 1593899, pl: 191 e4a4187047d1169c: Decrypted 172 bytes e4a4187047d1169c: crypto_hs, offset 0, length 168: 08000080007e0010... e4a4187047d1169c: Sending packet type: 4 (handshake), S0, Q1, Version 1, e4a4187047d1169c: <400000d5f8f6c04a>, , Seq: 0, pl: 69 e4a4187047d1169c: Prepared 49 bytes e4a4187047d1169c: ack (nb=1), 1593901, 1593899 e4a4187047d1169c: crypto_hs, offset 0, length 36: 140000207ea641c4... e4a4187047d1169c: Sending packet type: 6 (1rtt protected), S1, Q1, e4a4187047d1169c: <400000d5f8f6c04a>, Seq: 2 (2), Phi: 0, e4a4187047d1169c: Prepared 157 bytes e4a4187047d1169c: ack (nb=0), 1593899-1593900 e4a4187047d1169c: new_connection_id[1]: 0x8836b689b2547cda, 576091cc800d67a731fd607438e91d57 e4a4187047d1169c: padding, 120 bytes e4a4187047d1169c: T= 0.146567, cwin: 17143,flight: 950,nb_ret: 1,rtt_min: 35583,rtt: 61070,rtt_var: 54205,max_ack_delay: 0,state: 13 e4a4187047d1169c: Sending 277 bytes to 193.167.100.100:443 at T=0.146567 (39af468f) e4a4187047d1169c: Connection established. Version = 1, I-CID: e4a4187047d1169c, verified: 1 e4a4187047d1169c: Receiving 1057 bytes from 193.167.100.100:443 at T=0.146956 (39af4814) e4a4187047d1169c: Receiving packet type: 6 (1rtt protected), S0, Q1, e4a4187047d1169c: , Seq: 1593902 (1593902), Phi: 0, e4a4187047d1169c: Decrypted 1029 bytes e4a4187047d1169c: stream 0, offset 0, length 1024, fin = 1: aafff3a4ee2349bc... e4a4187047d1169c: padding, 1 bytes e4a4187047d1169c: T= 0.146956, cwin: 17143,flight: 950,nb_ret: 1,rtt_min: 35583,rtt: 61070,rtt_var: 54205,max_ack_delay: 0,state: 13 e4a4187047d1169c: All done, Closing the connection. e4a4187047d1169c: Sending packet type: 6 (1rtt protected), S1, Q1, e4a4187047d1169c: <400000d5f8f6c04a>, Seq: 3 (3), Phi: 0, e4a4187047d1169c: Prepared 13 bytes e4a4187047d1169c: ack (nb=1), 1593902, 1593899-1593900 e4a4187047d1169c: application_close, Error 0x0000, Reason length 0 e4a4187047d1169c: Sending 39 bytes to 193.167.100.100:443 at T=0.147000 (39af4840) e4a4187047d1169c: Receiving 400 bytes from 193.167.100.100:443 at T=0.178381 (39afc2d5) e4a4187047d1169c: Receiving packet type: 6 (1rtt protected), S0, Q1, e4a4187047d1169c: , Seq: 47 (1593903), Phi: 0, e4a4187047d1169c: Decrypted 374 bytes e4a4187047d1169c: crypto_hs, offset 0, length 250: 040000f600000e10... e4a4187047d1169c: ack (nb=1), 2, 0 e4a4187047d1169c: handshake_done e4a4187047d1169c: new_connection_id[1]: 0x400000d2a0aaab43, 118f15b4916d9021c01f12b1bef58d40 e4a4187047d1169c: new_connection_id[2]: 0x400000d71f233d53, a56dc525efe40f4923514979156b1b88 e4a4187047d1169c: new_connection_id[3]: 0x400000c214d6fcbd, e017341919c8b75027ad0b7d4c516fa5 e4a4187047d1169c: new_connection_id[4]: 0x400000c0ab368bcc, 655a5744f0def2f857cafd5f566371b9 e4a4187047d1169c: Receiving 403 bytes from 193.167.100.100:443 at T=0.769615 (39b8c857) e4a4187047d1169c: Receiving packet type: 6 (1rtt protected), S0, Q1, e4a4187047d1169c: , Seq: 51 (1593907), Phi: 0, e4a4187047d1169c: Decrypted 377 bytes e4a4187047d1169c: crypto_hs, offset 0, length 250: 040000f600000e10... e4a4187047d1169c: handshake_done e4a4187047d1169c: new_connection_id[1]: 0x400000d2a0aaab43, 118f15b4916d9021c01f12b1bef58d40 e4a4187047d1169c: new_connection_id[2]: 0x400000d71f233d53, a56dc525efe40f4923514979156b1b88 e4a4187047d1169c: new_connection_id[3]: 0x400000c214d6fcbd, e017341919c8b75027ad0b7d4c516fa5 e4a4187047d1169c: new_connection_id[4]: 0x400000c0ab368bcc, 655a5744f0def2f857cafd5f566371b9 e4a4187047d1169c: ack (nb=1), 2, 0 e4a4187047d1169c: Sending packet type: 6 (1rtt protected), S1, Q1, e4a4187047d1169c: <400000d5f8f6c04a>, Seq: 4 (4), Phi: 0, e4a4187047d1169c: Prepared 3 bytes e4a4187047d1169c: application_close, Error 0x0000, Reason length 0 e4a4187047d1169c: Sending 29 bytes to 193.167.100.100:443 at T=0.769723 (39b8c8c3) e4a4187047d1169c: Out of 2 zero RTT packets, 1 were acked by the server. e4a4187047d1169c: Received 1024 bytes in 0.893320 seconds, 0.009170 Mbps. e4a4187047d1169c: Sent 17 bytes in 0.893320 seconds, 0.000152 Mbps.