54dfee41646cf1b5: No root crt list specified -- certificate will not be verified. 54dfee41646cf1b5: Sending ALPN list (1): hq-interop 54dfee41646cf1b5: Sending transport parameter TLS extension (85 bytes): 54dfee41646cf1b5: Extension list (85 bytes): 54dfee41646cf1b5: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 54dfee41646cf1b5: Extension type: 4 (initial_max_data), length 4, 80100000 54dfee41646cf1b5: Extension type: 8 (max_streams_bidi), length 2, 4200 54dfee41646cf1b5: Extension type: 1 (idle_timeout), length 4, 8002bf20 54dfee41646cf1b5: Extension type: 3 (max_packet_size), length 2, 45a0 54dfee41646cf1b5: Extension type: 9 (max_streams_uni), length 2, 4200 54dfee41646cf1b5: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 54dfee41646cf1b5: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 54dfee41646cf1b5: Extension type: 14 (active_connection_id_limit), length 1, 08 54dfee41646cf1b5: Extension type: 11 (max_ack_delay), length 1, 0a 54dfee41646cf1b5: Extension type: 15 (hcid), length 8, be3c075ab3d0e203 54dfee41646cf1b5: Extension type: 2662 (unknown), length 4, 8000dfee 54dfee41646cf1b5: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 54dfee41646cf1b5: Extension type: 29016 (enable_time_stamp), length 1, 03 54dfee41646cf1b5: Extension type: 10930 (grease_quic_bit), length 0 54dfee41646cf1b5: Preparing GET on stream 0 for /oifhrnrfyp 54dfee41646cf1b5: Sending packet type: 2 (initial), S0, Q1, Version 1, 54dfee41646cf1b5: <54dfee41646cf1b5>, , Seq: 81913, pl: 635 54dfee41646cf1b5: Token length: 0 54dfee41646cf1b5: Prepared 615 bytes 54dfee41646cf1b5: ping, 1 bytes 54dfee41646cf1b5: crypto_hs, offset 0, length 610: 0100025e03036898... 54dfee41646cf1b5: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 54dfee41646cf1b5: <54dfee41646cf1b5>, , Seq: 0, pl: 566 54dfee41646cf1b5: Prepared 546 bytes 54dfee41646cf1b5: stream 0, offset 0, length 17, fin = 1: 474554202f6f6966... 54dfee41646cf1b5: padding, 526 bytes 54dfee41646cf1b5: Sending 1252 bytes to 193.167.100.100:443 at T=0.001855 (1b6be80c) 54dfee41646cf1b5: Receiving 35 bytes from 193.167.100.100:443 at T=0.054565 (1b6cb5f2) 54dfee41646cf1b5: T= 0.054565, Keys unavailable, buffered packet type 6. 54dfee41646cf1b5: T= 0.138394, Lost packet type 2, number 81913, size 645, DCID <>, reason: timer 54dfee41646cf1b5: Sending packet type: 2 (initial), S0, Q1, Version 1, 54dfee41646cf1b5: <54dfee41646cf1b5>, , Seq: 81914, pl: 635 54dfee41646cf1b5: Token length: 0 54dfee41646cf1b5: Prepared 615 bytes 54dfee41646cf1b5: ping, 1 bytes 54dfee41646cf1b5: crypto_hs, offset 0, length 610: 0100025e03036898... 54dfee41646cf1b5: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 54dfee41646cf1b5: <54dfee41646cf1b5>, , Seq: 1, pl: 566 54dfee41646cf1b5: Prepared 546 bytes 54dfee41646cf1b5: padding, 546 bytes 54dfee41646cf1b5: Sending 1252 bytes to 193.167.100.100:443 at T=0.138394 (1b6dfd67) 54dfee41646cf1b5: Receiving 1232 bytes from 193.167.100.100:443 at T=0.335572 (1b70ffa1) 54dfee41646cf1b5: Receiving packet type: 2 (initial), S0, Q1, Version 1, 54dfee41646cf1b5: , , Seq: 1, pl: 164 54dfee41646cf1b5: Token length: 0 54dfee41646cf1b5: Decrypted 147 bytes 54dfee41646cf1b5: ack_ecn (nb=0), 81913, ect0=0, ect1=1, ce=0 54dfee41646cf1b5: crypto_hs, offset 0, length 129: 0200007d03034dba... 54dfee41646cf1b5: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 54dfee41646cf1b5: , , Seq: 1, pl: 197 54dfee41646cf1b5: Decrypted 180 bytes 54dfee41646cf1b5: crypto_hs, offset 0, length 176: 0800008800860010... 54dfee41646cf1b5: Received transport parameter TLS extension (99 bytes): 54dfee41646cf1b5: Extension list (99 bytes): 54dfee41646cf1b5: Extension type: 0 (ocid), length 8, 54dfee41646cf1b5 54dfee41646cf1b5: Extension type: 1 (idle_timeout), length 4, 80007530 54dfee41646cf1b5: Extension type: 4 (initial_max_data), length 8, ffffffffffffffff 54dfee41646cf1b5: Extension type: 5 (max_stream_data_bidi_local), length 4, 80100000 54dfee41646cf1b5: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80100000 54dfee41646cf1b5: Extension type: 7 (max_stream_data_uni), length 4, 80100000 54dfee41646cf1b5: Extension type: 8 (max_streams_bidi), length 1, 10 54dfee41646cf1b5: Extension type: 9 (max_streams_uni), length 1, 10 54dfee41646cf1b5: Extension type: 11 (max_ack_delay), length 1, 14 54dfee41646cf1b5: Extension type: 14 (active_connection_id_limit), length 1, 08 54dfee41646cf1b5: Extension type: 15 (hcid), length 10, b834e6b0c359e533071d 54dfee41646cf1b5: Extension type: 17 (version_negotiation), length 12, 00000001ba8a2ada00000001 54dfee41646cf1b5: Extension type: 10930 (grease_quic_bit), length 0 54dfee41646cf1b5: Extension type: 4278378010 (unknown), length 2, 43e8 54dfee41646cf1b5: Extension type: 32 (max_datagram_frame_size), length 1, 00 54dfee41646cf1b5: Receiving packet type: 6 (1rtt protected), S1, Q1, 54dfee41646cf1b5: , Seq: 2 (2), Phi: 0, 54dfee41646cf1b5: Decrypted 790 bytes 54dfee41646cf1b5: ping, 1 bytes 54dfee41646cf1b5: padding, 789 bytes 54dfee41646cf1b5: T= 0.335572, cwin: 16005,flight: 1843,nb_ret: 1,rtt_min: 54565,rtt: 89459,rtt_var: 90249,max_ack_delay: 0,state: 10 54dfee41646cf1b5: The session was properly resumed! 54dfee41646cf1b5: Zero RTT data is accepted! 54dfee41646cf1b5: Negotiated ALPN: hq-interop 54dfee41646cf1b5: Receiving 35 bytes from 193.167.100.100:443 at T=0.335989 (1b710142) 54dfee41646cf1b5: Receiving packet type: 6 (1rtt protected), S0, Q1, 54dfee41646cf1b5: , Seq: 1 (1), Phi: 0, 54dfee41646cf1b5: Decrypted 9 bytes 54dfee41646cf1b5: ack_ecn (nb=0), 0, ect0=0, ect1=1, ce=0 54dfee41646cf1b5: T= 0.335989, cwin: 16580,flight: 1252,nb_ret: 1,rtt_min: 54565,rtt: 120043,rtt_var: 128855,max_ack_delay: 0,state: 10 54dfee41646cf1b5: Sending packet type: 4 (handshake), S0, Q0, Version 1, 54dfee41646cf1b5: , , Seq: 0, pl: 67 54dfee41646cf1b5: Prepared 47 bytes 54dfee41646cf1b5: ack_ecn (nb=0), 1, ect0=1, ect1=0, ce=0 54dfee41646cf1b5: crypto_hs, offset 0, length 36: 14000020ffa62193... 54dfee41646cf1b5: Sending packet type: 6 (1rtt protected), S1, Q1, 54dfee41646cf1b5: , Seq: 2 (2), Phi: 0, 54dfee41646cf1b5: Prepared 283 bytes 54dfee41646cf1b5: ack_ecn (nb=0), 1-2, ect0=2, ect1=0, ce=0 54dfee41646cf1b5: new_connection_id[1]: 0x9985b430d06a8b7e, 6c03a71c443333fab1e4c25748f478ba 54dfee41646cf1b5: new_connection_id[2]: 0xce5c5ab53e30cc64, a631a94434fc7938f64e1fc1a56edb62 54dfee41646cf1b5: new_connection_id[3]: 0x93b38f10ae450d45, cc07a87e68effbf73db37868db2cb39b 54dfee41646cf1b5: new_connection_id[4]: 0x05b6175778a5f9d4, cb9234723d2b18ccdf2d38eb6d6fa757 54dfee41646cf1b5: new_connection_id[5]: 0xc1d678cc3a4b82f5, ccccb4f84b3cc9d8091fe75682e5e3e0 54dfee41646cf1b5: new_connection_id[6]: 0xd025c3bf204f39ff, 6193a01df6f7d8ba76405fb0e9b1053a 54dfee41646cf1b5: new_connection_id[7]: 0x29590a823cc6a4c2, e2e936f3ee4cb3805b94ee8acd5c5c67 54dfee41646cf1b5: padding, 79 bytes 54dfee41646cf1b5: T= 0.335989, cwin: 17225,flight: 996,nb_ret: 1,rtt_min: 54565,rtt: 120043,rtt_var: 128855,max_ack_delay: 0,state: 13 54dfee41646cf1b5: Sending 405 bytes to 193.167.100.100:443 at T=0.335989 (1b710142) 54dfee41646cf1b5: Connection established. Version = 1, I-CID: 54dfee41646cf1b5, verified: 1 54dfee41646cf1b5: T= 0.863173, Lost packet type 4, number 0, size 78, DCID , reason: timer 54dfee41646cf1b5: Sending packet type: 4 (handshake), S0, Q0, Version 1, 54dfee41646cf1b5: , , Seq: 1, pl: 156 54dfee41646cf1b5: Prepared 136 bytes 54dfee41646cf1b5: crypto_hs, offset 0, length 36: 14000020ffa62193... 54dfee41646cf1b5: ack_ecn (nb=0), 1, ect0=1, ect1=0, ce=0 54dfee41646cf1b5: padding, 86 bytes 54dfee41646cf1b5: T= 0.863173, cwin: 17225,flight: 1085,nb_ret: 2,rtt_min: 54565,rtt: 120043,rtt_var: 128855,max_ack_delay: 0,state: 13 54dfee41646cf1b5: Sending 183 bytes to 193.167.100.100:443 at T=0.863173 (1b790c92) 54dfee41646cf1b5: Receiving 1332 bytes from 193.167.100.100:443 at T=0.895725 (1b798bba) 54dfee41646cf1b5: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 54dfee41646cf1b5: , , Seq: 2, pl: 25 54dfee41646cf1b5: Decrypted 8 bytes 54dfee41646cf1b5: ack_ecn (nb=0), 1, ect0=0, ect1=1, ce=0 54dfee41646cf1b5: Receiving packet type: 6 (1rtt protected), S1, Q0, 54dfee41646cf1b5: , Seq: 3 (3), Phi: 0, 54dfee41646cf1b5: Decrypted 1254 bytes 54dfee41646cf1b5: handshake_done 54dfee41646cf1b5: new_connection_id[1]: 0x5183c1b32236ff3d6e34, 6baa9bb49e0db1a6d6eb30c99e110f3b 54dfee41646cf1b5: new_connection_id[2]: 0x45750b52155e9619ca9e, 8de9001506abdf76381d42b172a2edbf 54dfee41646cf1b5: new_connection_id[3]: 0xfc1bc0f16bfae50a1d1f, 0f743f7fdabf41c9c67394558c971340 54dfee41646cf1b5: new_connection_id[4]: 0x92d60c8eba6bc7fafbb7, 0d95198240350acae1772d5a02e47e00 54dfee41646cf1b5: new_connection_id[5]: 0x13b384dffe50f6eaaa05, b0921d55f1f41188e8bf05048981b492 54dfee41646cf1b5: new_connection_id[6]: 0x5c32a0b998ddf4a60a4f, fef15eaf12b700071a3799f85166fca2 54dfee41646cf1b5: new_connection_id[7]: 0x3e4d1b974e0cb04a051d, 8904c73150ac47f788d7e08b19c622a3 54dfee41646cf1b5: padding, 1043 bytes 54dfee41646cf1b5: T= 0.895725, cwin: 17392,flight: 902,nb_ret: 2,rtt_min: 32552,rtt: 109106,rtt_var: 118514,max_ack_delay: 0,state: 14 54dfee41646cf1b5: T= 0.895854, Lost packet type 6, number 2, size 295, DCID , reason: timer 54dfee41646cf1b5: Sending packet type: 6 (1rtt protected), S0, Q1, 54dfee41646cf1b5: , Seq: 3 (3), Phi: 0, 54dfee41646cf1b5: Prepared 283 bytes 54dfee41646cf1b5: new_connection_id[1]: 0x9985b430d06a8b7e, 6c03a71c443333fab1e4c25748f478ba 54dfee41646cf1b5: new_connection_id[2]: 0xce5c5ab53e30cc64, a631a94434fc7938f64e1fc1a56edb62 54dfee41646cf1b5: new_connection_id[3]: 0x93b38f10ae450d45, cc07a87e68effbf73db37868db2cb39b 54dfee41646cf1b5: new_connection_id[4]: 0x05b6175778a5f9d4, cb9234723d2b18ccdf2d38eb6d6fa757 54dfee41646cf1b5: new_connection_id[5]: 0xc1d678cc3a4b82f5, ccccb4f84b3cc9d8091fe75682e5e3e0 54dfee41646cf1b5: new_connection_id[6]: 0xd025c3bf204f39ff, 6193a01df6f7d8ba76405fb0e9b1053a 54dfee41646cf1b5: new_connection_id[7]: 0x29590a823cc6a4c2, e2e936f3ee4cb3805b94ee8acd5c5c67 54dfee41646cf1b5: ack_ecn (nb=0), 1-3, ect0=3, ect1=0, ce=0 54dfee41646cf1b5: padding, 79 bytes 54dfee41646cf1b5: T= 0.895854, cwin: 2154,flight: 311,nb_ret: 3,rtt_min: 32552,rtt: 109106,rtt_var: 118514,max_ack_delay: 0,state: 14 54dfee41646cf1b5: Sending 311 bytes to 193.167.100.100:443 at T=0.895854 (1b798c3b) 54dfee41646cf1b5: T= 1.866172, Lost packet type 6, number 3, size 295, DCID , reason: timer 54dfee41646cf1b5: Sending packet type: 6 (1rtt protected), S0, Q0, 54dfee41646cf1b5: , Seq: 4 (4), Phi: 0, 54dfee41646cf1b5: Prepared 283 bytes 54dfee41646cf1b5: new_connection_id[1]: 0x9985b430d06a8b7e, 6c03a71c443333fab1e4c25748f478ba 54dfee41646cf1b5: new_connection_id[2]: 0xce5c5ab53e30cc64, a631a94434fc7938f64e1fc1a56edb62 54dfee41646cf1b5: new_connection_id[3]: 0x93b38f10ae450d45, cc07a87e68effbf73db37868db2cb39b 54dfee41646cf1b5: new_connection_id[4]: 0x05b6175778a5f9d4, cb9234723d2b18ccdf2d38eb6d6fa757 54dfee41646cf1b5: new_connection_id[5]: 0xc1d678cc3a4b82f5, ccccb4f84b3cc9d8091fe75682e5e3e0 54dfee41646cf1b5: new_connection_id[6]: 0xd025c3bf204f39ff, 6193a01df6f7d8ba76405fb0e9b1053a 54dfee41646cf1b5: new_connection_id[7]: 0x29590a823cc6a4c2, e2e936f3ee4cb3805b94ee8acd5c5c67 54dfee41646cf1b5: ack_ecn (nb=0), 1-3, ect0=3, ect1=0, ce=0 54dfee41646cf1b5: padding, 76 bytes 54dfee41646cf1b5: T= 1.866172, cwin: 2154,flight: 311,nb_ret: 4,rtt_min: 32552,rtt: 109106,rtt_var: 118514,max_ack_delay: 0,state: 14 54dfee41646cf1b5: Sending 311 bytes to 193.167.100.100:443 at T=1.866172 (1b885a89) 54dfee41646cf1b5: Receiving 1062 bytes from 193.167.100.100:443 at T=1.898377 (1b88d856) 54dfee41646cf1b5: Receiving packet type: 6 (1rtt protected), S0, Q1, 54dfee41646cf1b5: , Seq: 5 (5), Phi: 0, 54dfee41646cf1b5: Decrypted 1036 bytes 54dfee41646cf1b5: ack_ecn (nb=0), 4, ect0=0, ect1=2, ce=0 54dfee41646cf1b5: stream 0, offset 0, length 1024, fin = 1: 1c9798bd777a97ca... 54dfee41646cf1b5: T= 1.898377, cwin: 17687,flight: 0,nb_ret: 4,rtt_min: 32205,rtt: 99493,rtt_var: 108110,max_ack_delay: 0,state: 14 54dfee41646cf1b5: All done, Closing the connection. 54dfee41646cf1b5: Sending packet type: 6 (1rtt protected), S1, Q1, 54dfee41646cf1b5: , Seq: 5 (5), Phi: 0, 54dfee41646cf1b5: Prepared 13 bytes 54dfee41646cf1b5: ack_ecn (nb=1), 5, 3, ect0=4, ect1=0, ce=0 54dfee41646cf1b5: application_close, Error 0x0000, Reason length 0 54dfee41646cf1b5: Sending 41 bytes to 193.167.100.100:443 at T=1.898565 (1b88d912) 54dfee41646cf1b5: Receiving 38 bytes from 193.167.100.100:443 at T=1.929211 (1b8950c8) 54dfee41646cf1b5: Receiving packet type: 6 (1rtt protected), S1, Q1, 54dfee41646cf1b5: , Seq: 6 (6), Phi: 0, 54dfee41646cf1b5: Decrypted 12 bytes 54dfee41646cf1b5: ack_ecn (nb=0), 4-5, ect0=0, ect1=3, ce=0 54dfee41646cf1b5: connection_close, Error 0x0000, Offending frame 0x1d, Reason length 0 54dfee41646cf1b5: Out of 2 zero RTT packets, 1 were acked by the server. 54dfee41646cf1b5: Received 1024 bytes in 1.929331 seconds, 0.004246 Mbps. 54dfee41646cf1b5: Sent 17 bytes in 1.929331 seconds, 0.000070 Mbps.