5a4dcbf72dc566f1: No root crt list specified -- certificate will not be verified. 5a4dcbf72dc566f1: Sending ALPN list (1): hq-interop 5a4dcbf72dc566f1: Sending transport parameter TLS extension (85 bytes): 5a4dcbf72dc566f1: Extension list (85 bytes): 5a4dcbf72dc566f1: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 5a4dcbf72dc566f1: Extension type: 4 (initial_max_data), length 4, 80100000 5a4dcbf72dc566f1: Extension type: 8 (max_streams_bidi), length 2, 4200 5a4dcbf72dc566f1: Extension type: 1 (idle_timeout), length 4, 8002bf20 5a4dcbf72dc566f1: Extension type: 3 (max_packet_size), length 2, 45a0 5a4dcbf72dc566f1: Extension type: 9 (max_streams_uni), length 2, 4200 5a4dcbf72dc566f1: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 5a4dcbf72dc566f1: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 5a4dcbf72dc566f1: Extension type: 14 (active_connection_id_limit), length 1, 08 5a4dcbf72dc566f1: Extension type: 11 (max_ack_delay), length 1, 0a 5a4dcbf72dc566f1: Extension type: 15 (hcid), length 8, d28f635decc3a0ed 5a4dcbf72dc566f1: Extension type: 2848 (unknown), length 4, 80004dcb 5a4dcbf72dc566f1: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 5a4dcbf72dc566f1: Extension type: 29016 (enable_time_stamp), length 1, 03 5a4dcbf72dc566f1: Extension type: 10930 (grease_quic_bit), length 0 5a4dcbf72dc566f1: Preparing GET on stream 0 for /severe-quiet-necklace 5a4dcbf72dc566f1: Sending packet type: 2 (initial), S0, Q1, Version 1, 5a4dcbf72dc566f1: <5a4dcbf72dc566f1>, , Seq: 91685, pl: 553 5a4dcbf72dc566f1: Token length: 0 5a4dcbf72dc566f1: Prepared 533 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: crypto_hs, offset 0, length 528: 0100020c03035d08... 5a4dcbf72dc566f1: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 5a4dcbf72dc566f1: <5a4dcbf72dc566f1>, , Seq: 0, pl: 648 5a4dcbf72dc566f1: Prepared 628 bytes 5a4dcbf72dc566f1: stream 0, offset 0, length 28, fin = 1: 474554202f736576... 5a4dcbf72dc566f1: padding, 597 bytes 5a4dcbf72dc566f1: Sending 1252 bytes to 193.167.100.100:443 at T=0.001905 (2bfe7e68) 5a4dcbf72dc566f1: Receiving 1232 bytes from 193.167.100.100:443 at T=0.035021 (2bfeffc4) 5a4dcbf72dc566f1: Receiving packet type: 2 (initial), S0, Q1, Version 1, 5a4dcbf72dc566f1: , <400000116693006c>, Seq: 7069750, pl: 1206 5a4dcbf72dc566f1: Token length: 0 5a4dcbf72dc566f1: Decrypted 1187 bytes 5a4dcbf72dc566f1: crypto_hs, offset 0, length 96: 0200005c0303c846... 5a4dcbf72dc566f1: ack (nb=0), 91685 5a4dcbf72dc566f1: padding, 1078 bytes 5a4dcbf72dc566f1: Receiving 48 bytes from 193.167.100.100:443 at T=0.035342 (2bff0105) 5a4dcbf72dc566f1: T= 0.035342, Keys unavailable, buffered packet type 6. 5a4dcbf72dc566f1: Receiving 1072 bytes from 193.167.100.100:443 at T=0.036173 (2bff0444) 5a4dcbf72dc566f1: T= 0.036173, Keys unavailable, buffered packet type 6. 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 0, pl: 21 5a4dcbf72dc566f1: Prepared 1 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: Sending 46 bytes to 193.167.100.100:443 at T=0.039229 (2bff1034) 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 1, pl: 21 5a4dcbf72dc566f1: Prepared 1 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: Sending 46 bytes to 193.167.100.100:443 at T=0.122173 (2c005434) 5a4dcbf72dc566f1: Receiving 49 bytes from 193.167.100.100:443 at T=0.140145 (2c009a68) 5a4dcbf72dc566f1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: , <400000116693006c>, Seq: 7069752, pl: 25 5a4dcbf72dc566f1: Decrypted 6 bytes 5a4dcbf72dc566f1: ack (nb=0), 0 5a4dcbf72dc566f1: Receiving 1057 bytes from 193.167.100.100:443 at T=0.141007 (2c009dc6) 5a4dcbf72dc566f1: T= 0.141007, Keys unavailable, buffered packet type 6. 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 2, pl: 30 5a4dcbf72dc566f1: Prepared 10 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: ack (nb=0), 7069752 5a4dcbf72dc566f1: Sending 55 bytes to 193.167.100.100:443 at T=0.252028 (2c024f73) 5a4dcbf72dc566f1: Receiving 1057 bytes from 193.167.100.100:443 at T=0.344236 (2c03b7a3) 5a4dcbf72dc566f1: T= 0.344236, Keys unavailable, buffered packet type 6. 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 3, pl: 32 5a4dcbf72dc566f1: Prepared 12 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: ack (nb=0), 7069752 5a4dcbf72dc566f1: Sending 57 bytes to 193.167.100.100:443 at T=0.511645 (2c064594) 5a4dcbf72dc566f1: Receiving 50 bytes from 193.167.100.100:443 at T=0.542583 (2c06be6e) 5a4dcbf72dc566f1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: , <400000116693006c>, Seq: 7069755, pl: 26 5a4dcbf72dc566f1: Decrypted 7 bytes 5a4dcbf72dc566f1: ack (nb=1), 3, 0-1 5a4dcbf72dc566f1: T= 0.542650, Lost packet type 4, number 2, size 39, DCID <400000116693006c>, reason: repeat 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 4, pl: 31 5a4dcbf72dc566f1: Prepared 11 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: ack (nb=1), 7069755, 7069752 5a4dcbf72dc566f1: Sending 56 bytes to 193.167.100.100:443 at T=0.542650 (2c06beb1) 5a4dcbf72dc566f1: Receiving 1057 bytes from 193.167.100.100:443 at T=0.753977 (2c09f830) 5a4dcbf72dc566f1: T= 0.753977, Keys unavailable, buffered packet type 6. 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 5, pl: 34 5a4dcbf72dc566f1: Prepared 14 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: ack (nb=1), 7069755, 7069752 5a4dcbf72dc566f1: Sending 59 bytes to 193.167.100.100:443 at T=0.771397 (2c0a3c3c) 5a4dcbf72dc566f1: Receiving 52 bytes from 193.167.100.100:443 at T=0.802173 (2c0ab474) 5a4dcbf72dc566f1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: , <400000116693006c>, Seq: 7069758, pl: 28 5a4dcbf72dc566f1: Decrypted 9 bytes 5a4dcbf72dc566f1: ack (nb=2), 5, 3, 0-1 5a4dcbf72dc566f1: T= 0.802234, Lost packet type 4, number 4, size 40, DCID <400000116693006c>, reason: repeat 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 6, pl: 31 5a4dcbf72dc566f1: Prepared 11 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: ack (nb=1), 7069758, 7069755 5a4dcbf72dc566f1: Sending 56 bytes to 193.167.100.100:443 at T=0.802234 (2c0ab4b1) 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 7, pl: 34 5a4dcbf72dc566f1: Prepared 14 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: ack (nb=1), 7069758, 7069755 5a4dcbf72dc566f1: Sending 59 bytes to 193.167.100.100:443 at T=1.005955 (2c0dd07a) 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 8, pl: 34 5a4dcbf72dc566f1: Prepared 14 bytes 5a4dcbf72dc566f1: ping, 1 bytes 5a4dcbf72dc566f1: ack (nb=1), 7069758, 7069755 5a4dcbf72dc566f1: Sending 59 bytes to 193.167.100.100:443 at T=1.413357 (2c1407e4) 5a4dcbf72dc566f1: Receiving 53 bytes from 193.167.100.100:443 at T=1.554513 (2c162f48) 5a4dcbf72dc566f1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: , <400000116693006c>, Seq: 7069760, pl: 29 5a4dcbf72dc566f1: Decrypted 10 bytes 5a4dcbf72dc566f1: ack (nb=2), 5-8, 3, 0-1 5a4dcbf72dc566f1: Receiving 216 bytes from 193.167.100.100:443 at T=3.166955 (2c2ec9e2) 5a4dcbf72dc566f1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: , <400000116693006c>, Seq: 7069762, pl: 191 5a4dcbf72dc566f1: Decrypted 172 bytes 5a4dcbf72dc566f1: crypto_hs, offset 0, length 168: 08000080007e0010... 5a4dcbf72dc566f1: Received transport parameter TLS extension (101 bytes): 5a4dcbf72dc566f1: Extension list (101 bytes): 5a4dcbf72dc566f1: Extension type: 0 (ocid), length 8, 5a4dcbf72dc566f1 5a4dcbf72dc566f1: Extension type: 5 (max_stream_data_bidi_local), length 4, 86666666 5a4dcbf72dc566f1: Extension type: 6 (max_stream_data_bidi_remote), length 4, 86666666 5a4dcbf72dc566f1: Extension type: 7 (max_stream_data_uni), length 4, 86666666 5a4dcbf72dc566f1: Extension type: 4 (initial_max_data), length 4, 86666666 5a4dcbf72dc566f1: Extension type: 8 (max_streams_bidi), length 2, 4064 5a4dcbf72dc566f1: Extension type: 9 (max_streams_uni), length 2, 4064 5a4dcbf72dc566f1: Extension type: 1 (idle_timeout), length 4, 8000ea60 5a4dcbf72dc566f1: Extension type: 10 (ack_delay_exponent), length 1, 03 5a4dcbf72dc566f1: Extension type: 3 (max_packet_size), length 2, 45dc 5a4dcbf72dc566f1: Extension type: 2 (stateless_reset_token), length 16, 4c270cfde14b5775ef08dd81506fbf4d 5a4dcbf72dc566f1: Extension type: 15 (hcid), length 8, 400000116693006c 5a4dcbf72dc566f1: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff 5a4dcbf72dc566f1: Extension type: 267427841 (unknown), length 1, 00 5a4dcbf72dc566f1: Extension type: 20856 (unknown), length 1, 01 5a4dcbf72dc566f1: The session was properly resumed! 5a4dcbf72dc566f1: Zero RTT data is accepted! 5a4dcbf72dc566f1: Negotiated ALPN: hq-interop 5a4dcbf72dc566f1: Receiving 1057 bytes from 193.167.100.100:443 at T=3.167245 (2c2ecb04) 5a4dcbf72dc566f1: Receiving packet type: 6 (1rtt protected), S0, Q1, 5a4dcbf72dc566f1: , Seq: 7069757 (7069757), Phi: 0, 5a4dcbf72dc566f1: Decrypted 1029 bytes 5a4dcbf72dc566f1: stream 0, offset 0, length 1024, fin = 1: dbf0a6d380f76952... 5a4dcbf72dc566f1: padding, 1 bytes 5a4dcbf72dc566f1: T= 3.167245, cwin: 16193,flight: 673,nb_ret: 2,rtt_min: 30776,rtt: 51833,rtt_var: 41186,max_ack_delay: 0,state: 10 5a4dcbf72dc566f1: Receiving 1057 bytes from 193.167.100.100:443 at T=3.167245 (2c2ecb04) 5a4dcbf72dc566f1: Receiving packet type: 6 (1rtt protected), S0, Q1, 5a4dcbf72dc566f1: , Seq: 7069755 (7069755), Phi: 0, 5a4dcbf72dc566f1: Decrypted 1029 bytes 5a4dcbf72dc566f1: stream 0, offset 0, length 1024, fin = 1: dbf0a6d380f76952... 5a4dcbf72dc566f1: padding, 1 bytes 5a4dcbf72dc566f1: T= 3.167245, cwin: 16193,flight: 673,nb_ret: 2,rtt_min: 30776,rtt: 51833,rtt_var: 41186,max_ack_delay: 0,state: 10 5a4dcbf72dc566f1: Receiving 1057 bytes from 193.167.100.100:443 at T=3.167245 (2c2ecb04) 5a4dcbf72dc566f1: Receiving packet type: 6 (1rtt protected), S0, Q1, 5a4dcbf72dc566f1: , Seq: 7069753 (7069753), Phi: 0, 5a4dcbf72dc566f1: Decrypted 1029 bytes 5a4dcbf72dc566f1: stream 0, offset 0, length 1024, fin = 1: dbf0a6d380f76952... 5a4dcbf72dc566f1: padding, 1 bytes 5a4dcbf72dc566f1: T= 3.167245, cwin: 16193,flight: 673,nb_ret: 2,rtt_min: 30776,rtt: 51833,rtt_var: 41186,max_ack_delay: 0,state: 10 5a4dcbf72dc566f1: Receiving 1072 bytes from 193.167.100.100:443 at T=3.167245 (2c2ecb04) 5a4dcbf72dc566f1: Receiving packet type: 6 (1rtt protected), S0, Q1, 5a4dcbf72dc566f1: , Seq: 7069751 (7069751), Phi: 0, 5a4dcbf72dc566f1: Decrypted 1044 bytes 5a4dcbf72dc566f1: stream 0, offset 0, length 1024, fin = 1: dbf0a6d380f76952... 5a4dcbf72dc566f1: padding, 16 bytes 5a4dcbf72dc566f1: T= 3.167245, cwin: 16193,flight: 673,nb_ret: 2,rtt_min: 30776,rtt: 51833,rtt_var: 41186,max_ack_delay: 0,state: 10 5a4dcbf72dc566f1: Receiving 48 bytes from 193.167.100.100:443 at T=3.167245 (2c2ecb04) 5a4dcbf72dc566f1: Receiving packet type: 6 (1rtt protected), S0, Q1, 5a4dcbf72dc566f1: , Seq: 7069750 (7069750), Phi: 0, 5a4dcbf72dc566f1: Decrypted 20 bytes 5a4dcbf72dc566f1: ack (nb=0), 0 5a4dcbf72dc566f1: padding, 14 bytes 5a4dcbf72dc566f1: T= 3.167245, cwin: 16850,flight: 0,nb_ret: 2,rtt_min: 30776,rtt: 51833,rtt_var: 41186,max_ack_delay: 0,state: 10 5a4dcbf72dc566f1: Sending packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: <400000116693006c>, , Seq: 9, pl: 71 5a4dcbf72dc566f1: Prepared 51 bytes 5a4dcbf72dc566f1: ack (nb=2), 7069762, 7069760, 7069758 5a4dcbf72dc566f1: crypto_hs, offset 0, length 36: 14000020879160c5... 5a4dcbf72dc566f1: Sending packet type: 6 (1rtt protected), S1, Q1, 5a4dcbf72dc566f1: <400000116693006c>, Seq: 1 (1), Phi: 0, 5a4dcbf72dc566f1: Prepared 157 bytes 5a4dcbf72dc566f1: ack (nb=3), 7069757, 7069755, 7069753, 7069750-7069751 5a4dcbf72dc566f1: new_connection_id[1]: 0xfc93bad61de5bca2, 663c61ffb5d6f9ff7a688f9df662b5ff 5a4dcbf72dc566f1: padding, 112 bytes 5a4dcbf72dc566f1: T= 3.167245, cwin: 16850,flight: 279,nb_ret: 2,rtt_min: 30776,rtt: 51833,rtt_var: 41186,max_ack_delay: 0,state: 13 5a4dcbf72dc566f1: Sending 279 bytes to 193.167.100.100:443 at T=3.167245 (2c2ecb04) 5a4dcbf72dc566f1: Connection established. Version = 1, I-CID: 5a4dcbf72dc566f1, verified: 1 5a4dcbf72dc566f1: Receiving 1057 bytes from 193.167.100.100:443 at T=3.167724 (2c2ecce3) 5a4dcbf72dc566f1: Receiving packet type: 6 (1rtt protected), S0, Q1, 5a4dcbf72dc566f1: , Seq: 7069761 (7069761), Phi: 0, 5a4dcbf72dc566f1: Decrypted 1029 bytes 5a4dcbf72dc566f1: stream 0, offset 0, length 1024, fin = 1: dbf0a6d380f76952... 5a4dcbf72dc566f1: padding, 1 bytes 5a4dcbf72dc566f1: T= 3.167724, cwin: 16850,flight: 279,nb_ret: 2,rtt_min: 30776,rtt: 51833,rtt_var: 41186,max_ack_delay: 0,state: 13 5a4dcbf72dc566f1: All done, Closing the connection. 5a4dcbf72dc566f1: Sending packet type: 6 (1rtt protected), S1, Q1, 5a4dcbf72dc566f1: <400000116693006c>, Seq: 2 (2), Phi: 0, 5a4dcbf72dc566f1: Prepared 19 bytes 5a4dcbf72dc566f1: ack (nb=4), 7069761, 7069757, 7069755, 7069753, 7069750-7069751 5a4dcbf72dc566f1: application_close, Error 0x0000, Reason length 0 5a4dcbf72dc566f1: Sending 45 bytes to 193.167.100.100:443 at T=3.167770 (2c2ecd11) 5a4dcbf72dc566f1: Receiving 216 bytes from 193.167.100.100:443 at T=6.371295 (2c5faed6) 5a4dcbf72dc566f1: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 5a4dcbf72dc566f1: , <400000116693006c>, Seq: 7069764, pl: 191 5a4dcbf72dc566f1: Decrypted 172 bytes 5a4dcbf72dc566f1: crypto_hs, offset 0, length 168: 08000080007e0010... 5a4dcbf72dc566f1: Out of 1 zero RTT packets, 1 were acked by the server. 5a4dcbf72dc566f1: Received 1024 bytes in 12.665463 seconds, 0.000647 Mbps. 5a4dcbf72dc566f1: Sent 28 bytes in 12.665463 seconds, 0.000018 Mbps.