c84faf146590285f: No root crt list specified -- certificate will not be verified. c84faf146590285f: Sending ALPN list (1): hq-interop c84faf146590285f: Sending transport parameter TLS extension (85 bytes): c84faf146590285f: Extension list (85 bytes): c84faf146590285f: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 c84faf146590285f: Extension type: 4 (initial_max_data), length 4, 80100000 c84faf146590285f: Extension type: 8 (max_streams_bidi), length 2, 4200 c84faf146590285f: Extension type: 1 (idle_timeout), length 4, 8002bf20 c84faf146590285f: Extension type: 3 (max_packet_size), length 2, 45a0 c84faf146590285f: Extension type: 9 (max_streams_uni), length 2, 4200 c84faf146590285f: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 c84faf146590285f: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff c84faf146590285f: Extension type: 14 (active_connection_id_limit), length 1, 08 c84faf146590285f: Extension type: 11 (max_ack_delay), length 1, 0a c84faf146590285f: Extension type: 15 (hcid), length 8, 1eb364b0c53a9024 c84faf146590285f: Extension type: 6258 (unknown), length 4, 80004faf c84faf146590285f: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 c84faf146590285f: Extension type: 29016 (enable_time_stamp), length 1, 03 c84faf146590285f: Extension type: 10930 (grease_quic_bit), length 0 c84faf146590285f: Preparing GET on stream 0 for /uiguadxlun c84faf146590285f: Sending packet type: 2 (initial), S0, Q1, Version 1, c84faf146590285f: , <1eb364b0c53a9024>, Seq: 71329, pl: 635 c84faf146590285f: Token length: 0 c84faf146590285f: Prepared 615 bytes c84faf146590285f: ping, 1 bytes c84faf146590285f: crypto_hs, offset 0, length 610: 0100025e03036ed8... c84faf146590285f: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, c84faf146590285f: , <1eb364b0c53a9024>, Seq: 0, pl: 566 c84faf146590285f: Prepared 546 bytes c84faf146590285f: stream 0, offset 0, length 17, fin = 1: 474554202f756967... c84faf146590285f: padding, 526 bytes c84faf146590285f: Sending 1252 bytes to 193.167.100.100:443 at T=0.001850 (237d9966) c84faf146590285f: Receiving 1054 bytes from 193.167.100.100:443 at T=0.037820 (237e25e8) c84faf146590285f: T= 0.037820, Keys unavailable, buffered packet type 6. c84faf146590285f: Receiving 35 bytes from 193.167.100.100:443 at T=0.054069 (237e6561) c84faf146590285f: T= 0.054069, Keys unavailable, buffered packet type 6. c84faf146590285f: T= 0.096468, Lost packet type 2, number 71329, size 645, DCID <>, reason: timer c84faf146590285f: Sending packet type: 2 (initial), S0, Q1, Version 1, c84faf146590285f: , <1eb364b0c53a9024>, Seq: 71330, pl: 635 c84faf146590285f: Token length: 0 c84faf146590285f: Prepared 615 bytes c84faf146590285f: ping, 1 bytes c84faf146590285f: crypto_hs, offset 0, length 610: 0100025e03036ed8... c84faf146590285f: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, c84faf146590285f: , <1eb364b0c53a9024>, Seq: 1, pl: 566 c84faf146590285f: Prepared 546 bytes c84faf146590285f: padding, 546 bytes c84faf146590285f: Sending 1252 bytes to 193.167.100.100:443 at T=0.096468 (237f0b00) c84faf146590285f: Receiving 265 bytes from 193.167.100.100:443 at T=0.129441 (237f8bcd) c84faf146590285f: T= 0.129441, Keys unavailable, buffered packet type 6. c84faf146590285f: T= 0.285769, Lost packet type 2, number 71330, size 645, DCID <>, reason: timer c84faf146590285f: Sending packet type: 2 (initial), S0, Q1, Version 1, c84faf146590285f: , <1eb364b0c53a9024>, Seq: 71331, pl: 635 c84faf146590285f: Token length: 0 c84faf146590285f: Prepared 615 bytes c84faf146590285f: ping, 1 bytes c84faf146590285f: crypto_hs, offset 0, length 610: 0100025e03036ed8... c84faf146590285f: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, c84faf146590285f: , <1eb364b0c53a9024>, Seq: 2, pl: 566 c84faf146590285f: Prepared 546 bytes c84faf146590285f: padding, 546 bytes c84faf146590285f: Sending 1252 bytes to 193.167.100.100:443 at T=0.285769 (2381ee75) c84faf146590285f: Receiving 1232 bytes from 193.167.100.100:443 at T=0.405553 (2383c25d) c84faf146590285f: Receiving packet type: 2 (initial), S0, Q0, Version 1, c84faf146590285f: <1eb364b0c53a9024>, , Seq: 2, pl: 164 c84faf146590285f: Token length: 0 c84faf146590285f: Decrypted 147 bytes c84faf146590285f: ack_ecn (nb=0), 71329-71330, ect0=0, ect1=2, ce=0 c84faf146590285f: crypto_hs, offset 0, length 129: 0200007d0303adc9... c84faf146590285f: Receiving packet type: 4 (handshake), S0, Q0, Version 1, c84faf146590285f: <1eb364b0c53a9024>, , Seq: 2, pl: 197 c84faf146590285f: Decrypted 180 bytes c84faf146590285f: crypto_hs, offset 0, length 176: 0800008800860010... c84faf146590285f: Received transport parameter TLS extension (99 bytes): c84faf146590285f: Extension list (99 bytes): c84faf146590285f: Extension type: 0 (ocid), length 8, c84faf146590285f c84faf146590285f: Extension type: 1 (idle_timeout), length 4, 80007530 c84faf146590285f: Extension type: 4 (initial_max_data), length 8, ffffffffffffffff c84faf146590285f: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 c84faf146590285f: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 c84faf146590285f: Extension type: 7 (max_stream_data_uni), length 4, 80100000 c84faf146590285f: Extension type: 8 (max_streams_bidi), length 1, 10 c84faf146590285f: Extension type: 9 (max_streams_uni), length 1, 10 c84faf146590285f: Extension type: 11 (max_ack_delay), length 1, 14 c84faf146590285f: Extension type: 14 (active_connection_id_limit), length 1, 08 c84faf146590285f: Extension type: 15 (hcid), length 10, af83da3479972cc46a79 c84faf146590285f: Extension type: 17 (version_negotiation), length 12, 00000001aaba3a5a00000001 c84faf146590285f: Extension type: 10930 (grease_quic_bit), length 0 c84faf146590285f: Extension type: 4278378010 (unknown), length 2, 43e8 c84faf146590285f: Extension type: 32 (max_datagram_frame_size), length 1, 00 c84faf146590285f: Receiving packet type: 6 (1rtt protected), S1, Q1, c84faf146590285f: <1eb364b0c53a9024>, Seq: 4 (4), Phi: 0, c84faf146590285f: Decrypted 790 bytes c84faf146590285f: stream 0, offset 0, length 788, fin = 0: f43f827209147712... c84faf146590285f: T= 0.405553, cwin: 16650,flight: 2434,nb_ret: 2,rtt_min: 37820,rtt: 71728,rtt_var: 81998,max_ack_delay: 0,state: 10 c84faf146590285f: The session was properly resumed! c84faf146590285f: Zero RTT data is accepted! c84faf146590285f: Negotiated ALPN: hq-interop c84faf146590285f: Receiving 268 bytes from 193.167.100.100:443 at T=0.406085 (2383c471) c84faf146590285f: Receiving packet type: 6 (1rtt protected), S1, Q1, c84faf146590285f: <1eb364b0c53a9024>, Seq: 5 (5), Phi: 0, c84faf146590285f: Decrypted 242 bytes c84faf146590285f: stream 0, offset 788, length 236, fin = 1: faea85d64c592591... c84faf146590285f: T= 0.406085, cwin: 16650,flight: 2434,nb_ret: 2,rtt_min: 37820,rtt: 71728,rtt_var: 81998,max_ack_delay: 0,state: 10 c84faf146590285f: Receiving 265 bytes from 193.167.100.100:443 at T=0.406156 (2383c4b8) c84faf146590285f: Receiving packet type: 6 (1rtt protected), S1, Q1, c84faf146590285f: <1eb364b0c53a9024>, Seq: 3 (3), Phi: 0, c84faf146590285f: Decrypted 239 bytes c84faf146590285f: stream 0, offset 791, length 233, fin = 1: d64c59259121e2c4... c84faf146590285f: T= 0.406156, cwin: 16650,flight: 2434,nb_ret: 2,rtt_min: 37820,rtt: 71728,rtt_var: 81998,max_ack_delay: 0,state: 10 c84faf146590285f: Receiving 35 bytes from 193.167.100.100:443 at T=0.406156 (2383c4b8) c84faf146590285f: Receiving packet type: 6 (1rtt protected), S1, Q0, c84faf146590285f: <1eb364b0c53a9024>, Seq: 1 (1), Phi: 0, c84faf146590285f: Decrypted 9 bytes c84faf146590285f: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 c84faf146590285f: T= 0.406156, cwin: 17225,flight: 1843,nb_ret: 2,rtt_min: 37820,rtt: 113300,rtt_var: 144643,max_ack_delay: 0,state: 10 c84faf146590285f: Receiving 1054 bytes from 193.167.100.100:443 at T=0.406156 (2383c4b8) c84faf146590285f: Receiving packet type: 6 (1rtt protected), S1, Q0, c84faf146590285f: <1eb364b0c53a9024>, Seq: 0 (0), Phi: 0, c84faf146590285f: Decrypted 1028 bytes c84faf146590285f: stream 0, offset 0, length 1024, fin = 1: f43f827209147712... c84faf146590285f: T= 0.406156, cwin: 17225,flight: 1843,nb_ret: 2,rtt_min: 37820,rtt: 113300,rtt_var: 144643,max_ack_delay: 0,state: 10 c84faf146590285f: Sending packet type: 4 (handshake), S0, Q0, Version 1, c84faf146590285f: , <1eb364b0c53a9024>, Seq: 0, pl: 68 c84faf146590285f: Prepared 48 bytes c84faf146590285f: ack_ecn (nb=0), 2, ect0=1, ect1=0, ce=0 c84faf146590285f: crypto_hs, offset 0, length 36: 1400002061f7ac29... c84faf146590285f: Sending packet type: 6 (1rtt protected), S0, Q0, c84faf146590285f: , Seq: 3 (3), Phi: 0, c84faf146590285f: Prepared 283 bytes c84faf146590285f: ack_ecn (nb=1), 3-5, 0-1, ect0=5, ect1=0, ce=0 c84faf146590285f: new_connection_id[1]: 0xeb0d4e072cf0cb77, 0701600b9c7d892728872cc0e5ecf8b7 c84faf146590285f: new_connection_id[2]: 0x84f9c3a86ebfee25, 50d64e1ed389da57834dddfcd2d6180a c84faf146590285f: new_connection_id[3]: 0x4f898dafce6f4a41, 4406116beb4b100f748e5e1bdcf3a1b4 c84faf146590285f: new_connection_id[4]: 0xa2fe11993d4a91a3, bc75d47cf4c24074a9bd4f211a670ccd c84faf146590285f: new_connection_id[5]: 0x310691e43eb65879, 292abe0d08a6401c5aa12e0c8bc46c88 c84faf146590285f: new_connection_id[6]: 0x3fa6ce083774e8ad, 30d545d7aa635a099e30dd27a7c95406 c84faf146590285f: new_connection_id[7]: 0x2d812484e0643f9c, b07bac6e4791b76d3d6d99143de3cf85 c84faf146590285f: padding, 77 bytes c84faf146590285f: T= 0.406156, cwin: 17225,flight: 1588,nb_ret: 2,rtt_min: 37820,rtt: 113300,rtt_var: 144643,max_ack_delay: 0,state: 13 c84faf146590285f: Sending 406 bytes to 193.167.100.100:443 at T=0.406156 (2383c4b8) c84faf146590285f: Connection established. Version = 1, I-CID: c84faf146590285f, verified: 1 c84faf146590285f: Receiving 1332 bytes from 193.167.100.100:443 at T=0.439994 (238448e6) c84faf146590285f: Receiving packet type: 6 (1rtt protected), S0, Q0, c84faf146590285f: <1eb364b0c53a9024>, Seq: 7 (7), Phi: 0, c84faf146590285f: Decrypted 1306 bytes c84faf146590285f: ping, 1 bytes c84faf146590285f: padding, 1305 bytes c84faf146590285f: T= 0.439994, cwin: 17225,flight: 1588,nb_ret: 2,rtt_min: 37820,rtt: 113300,rtt_var: 144643,max_ack_delay: 0,state: 13 c84faf146590285f: All done, Closing the connection. c84faf146590285f: Sending packet type: 6 (1rtt protected), S1, Q1, c84faf146590285f: , Seq: 4 (4), Phi: 0, c84faf146590285f: Prepared 15 bytes c84faf146590285f: ack_ecn (nb=2), 7, 3-5, 0-1, ect0=6, ect1=0, ce=0 c84faf146590285f: application_close, Error 0x0000, Reason length 0 c84faf146590285f: Sending 43 bytes to 193.167.100.100:443 at T=0.440059 (23844927) c84faf146590285f: Receiving 380 bytes from 193.167.100.100:443 at T=0.444907 (23845c17) c84faf146590285f: Receiving packet type: 6 (1rtt protected), S0, Q1, c84faf146590285f: <1eb364b0c53a9024>, Seq: 8 (8), Phi: 0, c84faf146590285f: Decrypted 354 bytes c84faf146590285f: crypto_hs, offset 0, length 305: 0400012d0002a300... c84faf146590285f: new_token[43]: 0xad9a8b8d8601002ece7bba82a8057b70... c84faf146590285f: Out of 3 zero RTT packets, 1 were acked by the server. c84faf146590285f: Received 1024 bytes in 2.143580 seconds, 0.003822 Mbps. c84faf146590285f: Sent 17 bytes in 2.143580 seconds, 0.000063 Mbps.