54b0e56bde2f2f32: No root crt list specified -- certificate will not be verified. 54b0e56bde2f2f32: Sending ALPN list (1): hq-interop 54b0e56bde2f2f32: Sending transport parameter TLS extension (85 bytes): 54b0e56bde2f2f32: Extension list (85 bytes): 54b0e56bde2f2f32: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 54b0e56bde2f2f32: Extension type: 4 (initial_max_data), length 4, 80100000 54b0e56bde2f2f32: Extension type: 8 (max_streams_bidi), length 2, 4200 54b0e56bde2f2f32: Extension type: 1 (idle_timeout), length 4, 8002bf20 54b0e56bde2f2f32: Extension type: 3 (max_packet_size), length 2, 45a0 54b0e56bde2f2f32: Extension type: 9 (max_streams_uni), length 2, 4200 54b0e56bde2f2f32: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 54b0e56bde2f2f32: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 54b0e56bde2f2f32: Extension type: 14 (active_connection_id_limit), length 1, 08 54b0e56bde2f2f32: Extension type: 11 (max_ack_delay), length 1, 0a 54b0e56bde2f2f32: Extension type: 15 (hcid), length 8, ce152f4c6a1570bb 54b0e56bde2f2f32: Extension type: 2662 (unknown), length 4, 8000b0e5 54b0e56bde2f2f32: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 54b0e56bde2f2f32: Extension type: 29016 (enable_time_stamp), length 1, 03 54b0e56bde2f2f32: Extension type: 10930 (grease_quic_bit), length 0 54b0e56bde2f2f32: Preparing GET on stream 0 for /fwacorqufn 54b0e56bde2f2f32: Sending packet type: 2 (initial), S0, Q1, Version 1, 54b0e56bde2f2f32: <54b0e56bde2f2f32>, , Seq: 122805, pl: 617 54b0e56bde2f2f32: Token length: 0 54b0e56bde2f2f32: Prepared 597 bytes 54b0e56bde2f2f32: ping, 1 bytes 54b0e56bde2f2f32: crypto_hs, offset 0, length 592: 0100024c03036648... 54b0e56bde2f2f32: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 54b0e56bde2f2f32: <54b0e56bde2f2f32>, , Seq: 0, pl: 584 54b0e56bde2f2f32: Prepared 564 bytes 54b0e56bde2f2f32: stream 0, offset 0, length 17, fin = 1: 474554202f667761... 54b0e56bde2f2f32: padding, 544 bytes 54b0e56bde2f2f32: Sending 1252 bytes to 193.167.100.100:443 at T=0.001848 (2d6ce3e7) 54b0e56bde2f2f32: T= 0.252118, Lost packet type 2, number 122805, size 627, DCID <>, reason: timer 54b0e56bde2f2f32: Sending packet type: 2 (initial), S0, Q1, Version 1, 54b0e56bde2f2f32: <54b0e56bde2f2f32>, , Seq: 122806, pl: 617 54b0e56bde2f2f32: Token length: 0 54b0e56bde2f2f32: Prepared 597 bytes 54b0e56bde2f2f32: ping, 1 bytes 54b0e56bde2f2f32: crypto_hs, offset 0, length 592: 0100024c03036648... 54b0e56bde2f2f32: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 54b0e56bde2f2f32: <54b0e56bde2f2f32>, , Seq: 1, pl: 584 54b0e56bde2f2f32: Prepared 564 bytes 54b0e56bde2f2f32: padding, 564 bytes 54b0e56bde2f2f32: Sending 1252 bytes to 193.167.100.100:443 at T=0.252118 (2d70b585) 54b0e56bde2f2f32: Receiving 1200 bytes from 193.167.100.100:443 at T=0.286068 (2d713a23) 54b0e56bde2f2f32: Receiving packet type: 2 (initial), S0, Q1, Version 1, 54b0e56bde2f2f32: , <0000000000003002208d75ab8002f840a5260e4f>, Seq: 0, pl: 158 54b0e56bde2f2f32: Token length: 0 54b0e56bde2f2f32: Decrypted 141 bytes 54b0e56bde2f2f32: ack (nb=0), 122806 54b0e56bde2f2f32: crypto_hs, offset 0, length 129: 0200007d0303102a... 54b0e56bde2f2f32: Receiving packet type: 4 (handshake), S0, Q1, Version 1, 54b0e56bde2f2f32: , <0000000000003002208d75ab8002f840a5260e4f>, Seq: 0, pl: 190 54b0e56bde2f2f32: Decrypted 173 bytes 54b0e56bde2f2f32: crypto_hs, offset 0, length 169: 08000081007f0010... 54b0e56bde2f2f32: Received transport parameter TLS extension (102 bytes): 54b0e56bde2f2f32: Extension list (102 bytes): 54b0e56bde2f2f32: Extension type: 4 (initial_max_data), length 4, 80830000 54b0e56bde2f2f32: Extension type: 9 (max_streams_uni), length 1, 03 54b0e56bde2f2f32: Extension type: 8 (max_streams_bidi), length 2, 4080 54b0e56bde2f2f32: Extension type: 5 (max_stream_data_bidi_local), length 4, 80010000 54b0e56bde2f2f32: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010000 54b0e56bde2f2f32: Extension type: 7 (max_stream_data_uni), length 4, 80010000 54b0e56bde2f2f32: Extension type: 1 (idle_timeout), length 4, 800124f8 54b0e56bde2f2f32: Extension type: 3 (max_packet_size), length 4, 8000fff7 54b0e56bde2f2f32: Extension type: 14 (active_connection_id_limit), length 1, 02 54b0e56bde2f2f32: Extension type: 11 (max_ack_delay), length 1, 19 54b0e56bde2f2f32: Extension type: 10 (ack_delay_exponent), length 1, 03 54b0e56bde2f2f32: Extension type: 0 (ocid), length 8, 54b0e56bde2f2f32 54b0e56bde2f2f32: Extension type: 15 (hcid), length 20, 0000000000003002208d75ab8002f840a5260e4f 54b0e56bde2f2f32: Extension type: 2 (stateless_reset_token), length 16, 3651b026c8e349d57c6be6ce164002b4 54b0e56bde2f2f32: Receiving packet type: 6 (1rtt protected), S0, Q1, 54b0e56bde2f2f32: , Seq: 0 (0), Phi: 0, 54b0e56bde2f2f32: Decrypted 751 bytes 54b0e56bde2f2f32: crypto_hs, offset 0, length 572: 0400011a000000e3... 54b0e56bde2f2f32: padding, 175 bytes 54b0e56bde2f2f32: T= 0.286068, cwin: 15987,flight: 1218,nb_ret: 1,rtt_min: 33950,rtt: 33950,rtt_var: 16975,max_ack_delay: 0,state: 10 54b0e56bde2f2f32: The session was properly resumed! 54b0e56bde2f2f32: Zero RTT data is accepted! 54b0e56bde2f2f32: Negotiated ALPN: hq-interop 54b0e56bde2f2f32: Sending packet type: 4 (handshake), S0, Q1, Version 1, 54b0e56bde2f2f32: <0000000000003002208d75ab8002f840a5260e4f>, , Seq: 0, pl: 64 54b0e56bde2f2f32: Prepared 44 bytes 54b0e56bde2f2f32: ack (nb=0), 0 54b0e56bde2f2f32: crypto_hs, offset 0, length 36: 140000200100fddf... 54b0e56bde2f2f32: T= 0.286468, Lost packet type 5, number 0, size 593, DCID <0000000000003002208d75ab8002f840a5260e4f>, reason: timer 54b0e56bde2f2f32: Sending packet type: 6 (1rtt protected), S1, Q1, 54b0e56bde2f2f32: <0000000000003002208d75ab8002f840a5260e4f>, Seq: 2 (2), Phi: 0, 54b0e56bde2f2f32: Prepared 145 bytes 54b0e56bde2f2f32: new_connection_id[1]: 0x4e6ec23a35de2746, 716a9abe0b76b159c9b2cc9548e893c3 54b0e56bde2f2f32: stream 0, offset 0, length 17, fin = 1: 474554202f667761... 54b0e56bde2f2f32: padding, 97 bytes 54b0e56bde2f2f32: T= 0.286468, cwin: 15987,flight: 893,nb_ret: 2,rtt_min: 33950,rtt: 33950,rtt_var: 16975,max_ack_delay: 0,state: 13 54b0e56bde2f2f32: Sending 284 bytes to 193.167.100.100:443 at T=0.286468 (2d713bb3) 54b0e56bde2f2f32: Connection established. Version = 1, I-CID: 54b0e56bde2f2f32, verified: 1 54b0e56bde2f2f32: Sending packet type: 6 (1rtt protected), S1, Q1, 54b0e56bde2f2f32: <0000000000003002208d75ab8002f840a5260e4f>, Seq: 3 (3), Phi: 0, 54b0e56bde2f2f32: Prepared 17 bytes 54b0e56bde2f2f32: ack (nb=0), 0 54b0e56bde2f2f32: padding, 11 bytes 54b0e56bde2f2f32: T= 0.287131, cwin: 15987,flight: 948,nb_ret: 2,rtt_min: 33950,rtt: 33950,rtt_var: 16975,max_ack_delay: 0,state: 13 54b0e56bde2f2f32: Sending 55 bytes to 193.167.100.100:443 at T=0.287131 (2d713e4a) 54b0e56bde2f2f32: Receiving 1200 bytes from 193.167.100.100:443 at T=0.319566 (2d71bcfd) 54b0e56bde2f2f32: Receiving packet type: 6 (1rtt protected), S0, Q1, 54b0e56bde2f2f32: , Seq: 1 (1), Phi: 0, 54b0e56bde2f2f32: Decrypted 1174 bytes 54b0e56bde2f2f32: ack (nb=0), 1-2 54b0e56bde2f2f32: handshake_done 54b0e56bde2f2f32: new_connection_id[1]: 0x0000000000003002ecb65e3a2cdf6c1613b8202a, 3d2561af2d4c3a32c498220ade9d5213 54b0e56bde2f2f32: new_connection_id[2]: 0x0000000000003002c1288442e3a5720d76fc435e, ec56d1c6f792d784de85e99720449ebf 54b0e56bde2f2f32: new_connection_id[3]: 0x0000000000003002511c72a74c8f5ff4cc6a0378, 58eb58c804a78651b6ba988c98deabaa 54b0e56bde2f2f32: new_connection_id[4]: 0x0000000000003002b7a3842531683fd4f5c87092, 82f5fe63170e865693a50cd34183185e 54b0e56bde2f2f32: new_connection_id[5]: 0x00000000000030020bd4bb32061ca67e671cd2f9, a069a99255f9d5c194d9359ff2b0db9e 54b0e56bde2f2f32: new_connection_id[6]: 0x00000000000030029cfe181c7ac34cef186f233b, 0a099076355b02fb782301d12c64090f 54b0e56bde2f2f32: new_connection_id[7]: 0x0000000000003002526903325cc84d391d657136, afc464469e6966d3e88fe10f05c1b729 54b0e56bde2f2f32: stream 0, offset 0, length 883, fin = 0: e582b617d8f0f4b9... 54b0e56bde2f2f32: T= 0.319566, cwin: 16747,flight: 55,nb_ret: 2,rtt_min: 33098,rtt: 33843,rtt_var: 12944,max_ack_delay: 0,state: 14 54b0e56bde2f2f32: Sending packet type: 6 (1rtt protected), S1, Q1, 54b0e56bde2f2f32: <0000000000003002208d75ab8002f840a5260e4f>, Seq: 4 (4), Phi: 0, 54b0e56bde2f2f32: Prepared 17 bytes 54b0e56bde2f2f32: ack (nb=0), 0-1 54b0e56bde2f2f32: padding, 11 bytes 54b0e56bde2f2f32: T= 0.323768, cwin: 16747,flight: 110,nb_ret: 2,rtt_min: 33098,rtt: 33843,rtt_var: 12944,max_ack_delay: 0,state: 14 54b0e56bde2f2f32: Sending 55 bytes to 193.167.100.100:443 at T=0.323768 (2d71cd67) 54b0e56bde2f2f32: Receiving 29 bytes from 193.167.100.100:443 at T=0.401891 (2d72fe92) 54b0e56bde2f2f32: Receiving packet type: 6 (1rtt protected), S0, Q1, 54b0e56bde2f2f32: , Seq: 3 (3), Phi: 0, 54b0e56bde2f2f32: Decrypted 3 bytes 54b0e56bde2f2f32: ping, 1 bytes 54b0e56bde2f2f32: padding, 2 bytes 54b0e56bde2f2f32: T= 0.401891, cwin: 16747,flight: 110,nb_ret: 2,rtt_min: 33098,rtt: 33843,rtt_var: 12944,max_ack_delay: 0,state: 14 54b0e56bde2f2f32: Sending packet type: 6 (1rtt protected), S1, Q1, 54b0e56bde2f2f32: <0000000000003002208d75ab8002f840a5260e4f>, Seq: 5 (5), Phi: 0, 54b0e56bde2f2f32: Prepared 17 bytes 54b0e56bde2f2f32: ack (nb=1), 3, 0-1 54b0e56bde2f2f32: padding, 10 bytes 54b0e56bde2f2f32: T= 0.401996, cwin: 16747,flight: 165,nb_ret: 2,rtt_min: 33098,rtt: 33843,rtt_var: 12944,max_ack_delay: 0,state: 14 54b0e56bde2f2f32: Sending 55 bytes to 193.167.100.100:443 at T=0.401996 (2d72fefb) 54b0e56bde2f2f32: Receiving 29 bytes from 193.167.100.100:443 at T=0.402095 (2d72ff5e) 54b0e56bde2f2f32: Receiving packet type: 6 (1rtt protected), S0, Q1, 54b0e56bde2f2f32: , Seq: 4 (4), Phi: 0, 54b0e56bde2f2f32: Decrypted 3 bytes 54b0e56bde2f2f32: ping, 1 bytes 54b0e56bde2f2f32: padding, 2 bytes 54b0e56bde2f2f32: T= 0.402095, cwin: 16747,flight: 165,nb_ret: 2,rtt_min: 33098,rtt: 33843,rtt_var: 12944,max_ack_delay: 0,state: 14 54b0e56bde2f2f32: Sending packet type: 6 (1rtt protected), S1, Q1, 54b0e56bde2f2f32: <0000000000003002208d75ab8002f840a5260e4f>, Seq: 6 (6), Phi: 0, 54b0e56bde2f2f32: Prepared 17 bytes 54b0e56bde2f2f32: ack (nb=1), 3-4, 0-1 54b0e56bde2f2f32: padding, 9 bytes 54b0e56bde2f2f32: T= 0.406294, cwin: 16747,flight: 220,nb_ret: 2,rtt_min: 33098,rtt: 33843,rtt_var: 12944,max_ack_delay: 0,state: 14 54b0e56bde2f2f32: Sending 55 bytes to 193.167.100.100:443 at T=0.406294 (2d730fc5) 54b0e56bde2f2f32: Receiving 1440 bytes from 193.167.100.100:443 at T=0.419296 (2d73428f) 54b0e56bde2f2f32: Receiving packet type: 6 (1rtt protected), S0, Q1, 54b0e56bde2f2f32: , Seq: 5 (5), Phi: 0, 54b0e56bde2f2f32: Decrypted 1414 bytes 54b0e56bde2f2f32: ping, 1 bytes 54b0e56bde2f2f32: padding, 1413 bytes 54b0e56bde2f2f32: T= 0.419296, cwin: 16747,flight: 220,nb_ret: 2,rtt_min: 33098,rtt: 33843,rtt_var: 12944,max_ack_delay: 0,state: 14 54b0e56bde2f2f32: Sending packet type: 6 (1rtt protected), S1, Q1, 54b0e56bde2f2f32: <0000000000003002208d75ab8002f840a5260e4f>, Seq: 7 (7), Phi: 0, 54b0e56bde2f2f32: Prepared 17 bytes 54b0e56bde2f2f32: ack (nb=1), 3-5, 0-1 54b0e56bde2f2f32: padding, 9 bytes 54b0e56bde2f2f32: T= 0.423497, cwin: 16747,flight: 275,nb_ret: 2,rtt_min: 33098,rtt: 33843,rtt_var: 12944,max_ack_delay: 0,state: 14 54b0e56bde2f2f32: Sending 55 bytes to 193.167.100.100:443 at T=0.423497 (2d7352f8) 54b0e56bde2f2f32: Receiving 178 bytes from 193.167.100.100:443 at T=0.433034 (2d737839) 54b0e56bde2f2f32: Receiving packet type: 6 (1rtt protected), S0, Q1, 54b0e56bde2f2f32: , Seq: 6 (6), Phi: 0, 54b0e56bde2f2f32: Decrypted 152 bytes 54b0e56bde2f2f32: stream 0, offset 883, length 141, fin = 0: 85de1d02ec053933... 54b0e56bde2f2f32: stream 0, offset 1024, length 0, fin = 1: 54b0e56bde2f2f32: T= 0.433034, cwin: 16747,flight: 275,nb_ret: 2,rtt_min: 33098,rtt: 33843,rtt_var: 12944,max_ack_delay: 0,state: 14 54b0e56bde2f2f32: All done, Closing the connection. 54b0e56bde2f2f32: Sending packet type: 6 (1rtt protected), S1, Q1, 54b0e56bde2f2f32: <0000000000003002208d75ab8002f840a5260e4f>, Seq: 8 (8), Phi: 0, 54b0e56bde2f2f32: Prepared 10 bytes 54b0e56bde2f2f32: ack (nb=1), 3-6, 0-1 54b0e56bde2f2f32: application_close, Error 0x0000, Reason length 0 54b0e56bde2f2f32: Sending 48 bytes to 193.167.100.100:443 at T=0.433154 (2d7378b1) 54b0e56bde2f2f32: Receiving 29 bytes from 193.167.100.100:443 at T=0.464021 (2d73f144) 54b0e56bde2f2f32: Receiving packet type: 6 (1rtt protected), S0, Q1, 54b0e56bde2f2f32: , Seq: 7 (7), Phi: 0, 54b0e56bde2f2f32: Decrypted 3 bytes 54b0e56bde2f2f32: max_streams_bidir: max rank 129. 54b0e56bde2f2f32: Out of 2 zero RTT packets, 1 were acked by the server. 54b0e56bde2f2f32: Received 1024 bytes in 0.726564 seconds, 0.011275 Mbps. 54b0e56bde2f2f32: Sent 17 bytes in 0.726564 seconds, 0.000187 Mbps.