994f1da3826e90a4: No root crt list specified -- certificate will not be verified. 994f1da3826e90a4: Sending ALPN list (1): hq-interop 994f1da3826e90a4: Sending transport parameter TLS extension (85 bytes): 994f1da3826e90a4: Extension list (85 bytes): 994f1da3826e90a4: Extension type: 5 (max_stream_data_bidi_local), length 4, 80200000 994f1da3826e90a4: Extension type: 4 (initial_max_data), length 4, 80100000 994f1da3826e90a4: Extension type: 8 (max_streams_bidi), length 2, 4200 994f1da3826e90a4: Extension type: 1 (idle_timeout), length 4, 8002bf20 994f1da3826e90a4: Extension type: 3 (max_packet_size), length 2, 45a0 994f1da3826e90a4: Extension type: 9 (max_streams_uni), length 2, 4200 994f1da3826e90a4: Extension type: 6 (max_stream_data_bidi_remote), length 4, 80010063 994f1da3826e90a4: Extension type: 7 (max_stream_data_uni), length 4, 8000ffff 994f1da3826e90a4: Extension type: 14 (active_connection_id_limit), length 1, 08 994f1da3826e90a4: Extension type: 11 (max_ack_delay), length 1, 0a 994f1da3826e90a4: Extension type: 15 (hcid), length 8, 69bb032f1054964c 994f1da3826e90a4: Extension type: 4801 (unknown), length 4, 80004f1d 994f1da3826e90a4: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 994f1da3826e90a4: Extension type: 29016 (enable_time_stamp), length 1, 03 994f1da3826e90a4: Extension type: 10930 (grease_quic_bit), length 0 994f1da3826e90a4: Preparing GET on stream 0 for /iyaxceuxbo 994f1da3826e90a4: Sending packet type: 2 (initial), S0, Q1, Version 1, 994f1da3826e90a4: <994f1da3826e90a4>, <69bb032f1054964c>, Seq: 116704, pl: 393 994f1da3826e90a4: Token length: 0 994f1da3826e90a4: Prepared 373 bytes 994f1da3826e90a4: ping, 1 bytes 994f1da3826e90a4: crypto_hs, offset 0, length 368: 0100016c03032a63... 994f1da3826e90a4: Sending packet type: 5 (0rtt protected), S0, Q1, Version 1, 994f1da3826e90a4: <994f1da3826e90a4>, <69bb032f1054964c>, Seq: 0, pl: 808 994f1da3826e90a4: Prepared 788 bytes 994f1da3826e90a4: stream 0, offset 0, length 17, fin = 1: 474554202f697961... 994f1da3826e90a4: padding, 768 bytes 994f1da3826e90a4: Sending 1252 bytes to 193.167.100.100:443 at T=0.001921 (371953fe) 994f1da3826e90a4: Receiving 1200 bytes from 193.167.100.100:443 at T=0.035342 (3719d68b) 994f1da3826e90a4: Receiving packet type: 2 (initial), S0, Q1, Version 1, 994f1da3826e90a4: <69bb032f1054964c>, , Seq: 0, pl: 161 994f1da3826e90a4: Token length: 0 994f1da3826e90a4: Decrypted 144 bytes 994f1da3826e90a4: ack_ecn (nb=0), 116704, ect0=0, ect1=1, ce=0 994f1da3826e90a4: crypto_hs, offset 0, length 129: 0200007d030340fc... 994f1da3826e90a4: Receiving packet type: 4 (handshake), S0, Q0, Version 1, 994f1da3826e90a4: <69bb032f1054964c>, , Seq: 0, pl: 988 994f1da3826e90a4: Decrypted 971 bytes 994f1da3826e90a4: crypto_hs, offset 0, length 177: 0800008900870010... 994f1da3826e90a4: padding, 790 bytes 994f1da3826e90a4: Received transport parameter TLS extension (110 bytes): 994f1da3826e90a4: Extension list (110 bytes): 994f1da3826e90a4: Extension type: 1 (idle_timeout), length 4, 80007530 994f1da3826e90a4: Extension type: 3 (max_packet_size), length 2, 45c0 994f1da3826e90a4: Extension type: 4 (initial_max_data), length 8, ffffffffffffffff 994f1da3826e90a4: Extension type: 5 (max_stream_data_bidi_local), length 4, 801312d0 994f1da3826e90a4: Extension type: 6 (max_stream_data_bidi_remote), length 4, 801312d0 994f1da3826e90a4: Extension type: 7 (max_stream_data_uni), length 4, 801312d0 994f1da3826e90a4: Extension type: 8 (max_streams_bidi), length 2, 4064 994f1da3826e90a4: Extension type: 9 (max_streams_uni), length 2, 4064 994f1da3826e90a4: Extension type: 14 (active_connection_id_limit), length 1, 05 994f1da3826e90a4: Extension type: 182 (unknown), length 0 994f1da3826e90a4: Extension type: 2 (stateless_reset_token), length 16, 76a062d826d8f4c31c6849acd56f86c2 994f1da3826e90a4: Extension type: 32 (max_datagram_frame_size), length 4, 8000ffff 994f1da3826e90a4: Extension type: 0 (ocid), length 8, 994f1da3826e90a4 994f1da3826e90a4: Extension type: 15 (hcid), length 8, e7a10bcadc37682f 994f1da3826e90a4: Extension type: 10930 (grease_quic_bit), length 0 994f1da3826e90a4: Extension type: 4278509083 (min_ack_delay), length 2, 43e8 994f1da3826e90a4: The session was properly resumed! 994f1da3826e90a4: Zero RTT data is accepted! 994f1da3826e90a4: Negotiated ALPN: hq-interop 994f1da3826e90a4: Receiving 222 bytes from 193.167.100.100:443 at T=0.035774 (3719d83b) 994f1da3826e90a4: Receiving packet type: 6 (1rtt protected), S0, Q1, 994f1da3826e90a4: <69bb032f1054964c>, Seq: 0 (0), Phi: 0, 994f1da3826e90a4: Decrypted 196 bytes 994f1da3826e90a4: new_connection_id[1]: 0xbf6acc12f47fa674, 7892d35d620b1e019f6bb963e61f07b9 994f1da3826e90a4: new_connection_id[2]: 0x62d3f330593a7022, 8750c42b29ccb7373ea5ac5046f6bc65 994f1da3826e90a4: new_connection_id[3]: 0x288cdb4256c013aa, 6696f9bcae9c605498f4a0c47738cdd4 994f1da3826e90a4: new_connection_id[4]: 0x6a86fd192760c5b0, a44ea6d4314ad40cf7ed82aa2d5373bc 994f1da3826e90a4: new_connection_id[5]: 0x62d738868ed3bc3d, a2007d7a9e3e16915cfd0186d6028112 994f1da3826e90a4: new_connection_id[6]: 0x1f2d95a41dac2641, 041ddcbf9bafaa42786998f38a04de24 994f1da3826e90a4: new_connection_id[7]: 0xd567e3ad92acaabd, 606f9d18317617aa6801c8b3b2f30594 994f1da3826e90a4: T= 0.035774, cwin: 15763,flight: 833,nb_ret: 0,rtt_min: 33421,rtt: 33421,rtt_var: 16710,max_ack_delay: 0,state: 10 994f1da3826e90a4: Sending packet type: 4 (handshake), S0, Q0, Version 1, 994f1da3826e90a4: , <69bb032f1054964c>, Seq: 0, pl: 67 994f1da3826e90a4: Prepared 47 bytes 994f1da3826e90a4: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 994f1da3826e90a4: crypto_hs, offset 0, length 36: 14000020018c39fc... 994f1da3826e90a4: Sending packet type: 6 (1rtt protected), S1, Q0, 994f1da3826e90a4: , Seq: 1 (1), Phi: 0, 994f1da3826e90a4: Prepared 157 bytes 994f1da3826e90a4: new_connection_id[1]: 0x2c2ab63d4a17ee1d, df0b260e3624589bd926cb705a7ae9ea 994f1da3826e90a4: new_connection_id[2]: 0xd2479fdabbe30529, ded3915cd7780348e6a44f8c54c10806 994f1da3826e90a4: new_connection_id[3]: 0xde03fbaa6a26c15b, 12d373374210583893620c85361fc21f 994f1da3826e90a4: new_connection_id[4]: 0xc2fda9d10ab75bcd, 8444562662de9d3831590fd4ca76c4bc 994f1da3826e90a4: padding, 45 bytes 994f1da3826e90a4: T= 0.035845, cwin: 15763,flight: 1108,nb_ret: 0,rtt_min: 33421,rtt: 33421,rtt_var: 16710,max_ack_delay: 0,state: 13 994f1da3826e90a4: Sending 275 bytes to 193.167.100.100:443 at T=0.035845 (3719d882) 994f1da3826e90a4: Connection established. Version = 1, I-CID: 994f1da3826e90a4, verified: 1 994f1da3826e90a4: Sending packet type: 6 (1rtt protected), S1, Q0, 994f1da3826e90a4: , Seq: 2 (2), Phi: 0, 994f1da3826e90a4: Prepared 29 bytes 994f1da3826e90a4: ack_ecn (nb=0), 0, ect0=1, ect1=0, ce=0 994f1da3826e90a4: padding, 20 bytes 994f1da3826e90a4: T= 0.036838, cwin: 15763,flight: 1163,nb_ret: 0,rtt_min: 33421,rtt: 33421,rtt_var: 16710,max_ack_delay: 0,state: 13 994f1da3826e90a4: Sending 55 bytes to 193.167.100.100:443 at T=0.036838 (3719dc63) 994f1da3826e90a4: Receiving 397 bytes from 193.167.100.100:443 at T=0.067206 (371a5303) 994f1da3826e90a4: Receiving packet type: 6 (1rtt protected), S1, Q1, 994f1da3826e90a4: <2c2ab63d4a17ee1d>, Seq: 1 (1), Phi: 0, 994f1da3826e90a4: Decrypted 371 bytes 994f1da3826e90a4: handshake_done 994f1da3826e90a4: ack_ecn (nb=0), 0-1, ect0=0, ect1=2, ce=0 994f1da3826e90a4: crypto_hs, offset 0, length 356: 0400005500015180... 994f1da3826e90a4: retire_connection_id[0] 994f1da3826e90a4: T= 0.067206, cwin: 16823,flight: 55,nb_ret: 0,rtt_min: 31361,rtt: 33163,rtt_var: 13047,max_ack_delay: 0,state: 14 994f1da3826e90a4: Sending packet type: 6 (1rtt protected), S0, Q0, 994f1da3826e90a4: , Seq: 3 (3), Phi: 0, 994f1da3826e90a4: Prepared 157 bytes 994f1da3826e90a4: new_connection_id[5]: 0xf144ac3e83852b16, ca74fc08d3286d3cca70b6271b837a8e 994f1da3826e90a4: ack_frequency: S=0, P=2, uS=7840, Reordering threshold: 0 994f1da3826e90a4: padding, 122 bytes 994f1da3826e90a4: T= 0.067345, cwin: 16823,flight: 238,nb_ret: 0,rtt_min: 31361,rtt: 33163,rtt_var: 13047,max_ack_delay: 0,state: 14 994f1da3826e90a4: Sending 183 bytes to 193.167.100.100:443 at T=0.067345 (371a538e) 994f1da3826e90a4: Receiving 31 bytes from 193.167.100.100:443 at T=0.068002 (371a561f) 994f1da3826e90a4: Receiving packet type: 6 (1rtt protected), S1, Q0, 994f1da3826e90a4: <2c2ab63d4a17ee1d>, Seq: 4 (4), Phi: 0, 994f1da3826e90a4: Decrypted 5 bytes 994f1da3826e90a4: stream 0, offset 1024, length 0, fin = 1: 994f1da3826e90a4: T= 0.068002, cwin: 16823,flight: 238,nb_ret: 0,rtt_min: 31361,rtt: 33163,rtt_var: 13047,max_ack_delay: 0,state: 14 994f1da3826e90a4: Sending packet type: 6 (1rtt protected), S0, Q0, 994f1da3826e90a4: , Seq: 4 (4), Phi: 0, 994f1da3826e90a4: Prepared 29 bytes 994f1da3826e90a4: ack_ecn (nb=1), 4, 0-1, ect0=3, ect1=0, ce=0 994f1da3826e90a4: padding, 19 bytes 994f1da3826e90a4: T= 0.068037, cwin: 16823,flight: 293,nb_ret: 0,rtt_min: 31361,rtt: 33163,rtt_var: 13047,max_ack_delay: 0,state: 14 994f1da3826e90a4: Sending 55 bytes to 193.167.100.100:443 at T=0.068037 (371a5642) 994f1da3826e90a4: Receiving 390 bytes from 193.167.100.100:443 at T=0.161056 (371bc19d) 994f1da3826e90a4: Receiving packet type: 6 (1rtt protected), S1, Q1, 994f1da3826e90a4: <2c2ab63d4a17ee1d>, Seq: 5 (5), Phi: 0, 994f1da3826e90a4: Decrypted 364 bytes 994f1da3826e90a4: handshake_done 994f1da3826e90a4: immediate_ack 994f1da3826e90a4: crypto_hs, offset 0, length 356: 0400005500015180... 994f1da3826e90a4: retire_connection_id[0] 994f1da3826e90a4: T= 0.161056, cwin: 16823,flight: 293,nb_ret: 0,rtt_min: 31361,rtt: 33163,rtt_var: 13047,max_ack_delay: 0,state: 14 994f1da3826e90a4: Sending packet type: 6 (1rtt protected), S0, Q0, 994f1da3826e90a4: , Seq: 5 (5), Phi: 0, 994f1da3826e90a4: Prepared 29 bytes 994f1da3826e90a4: ack_ecn (nb=1), 4-5, 0-1, ect0=4, ect1=0, ce=0 994f1da3826e90a4: padding, 19 bytes 994f1da3826e90a4: T= 0.161216, cwin: 16823,flight: 348,nb_ret: 0,rtt_min: 31361,rtt: 33163,rtt_var: 13047,max_ack_delay: 0,state: 14 994f1da3826e90a4: Sending 55 bytes to 193.167.100.100:443 at T=0.161216 (371bc23d) 994f1da3826e90a4: Receiving 390 bytes from 193.167.100.100:443 at T=0.161329 (371bc2ae) 994f1da3826e90a4: Receiving packet type: 6 (1rtt protected), S1, Q1, 994f1da3826e90a4: <2c2ab63d4a17ee1d>, Seq: 6 (6), Phi: 0, 994f1da3826e90a4: Decrypted 364 bytes 994f1da3826e90a4: handshake_done 994f1da3826e90a4: immediate_ack 994f1da3826e90a4: crypto_hs, offset 0, length 356: 0400005500015180... 994f1da3826e90a4: retire_connection_id[0] 994f1da3826e90a4: T= 0.161329, cwin: 16823,flight: 348,nb_ret: 0,rtt_min: 31361,rtt: 33163,rtt_var: 13047,max_ack_delay: 0,state: 14 994f1da3826e90a4: Sending packet type: 6 (1rtt protected), S0, Q0, 994f1da3826e90a4: , Seq: 6 (6), Phi: 0, 994f1da3826e90a4: Prepared 29 bytes 994f1da3826e90a4: ack_ecn (nb=1), 4-6, 0-1, ect0=5, ect1=0, ce=0 994f1da3826e90a4: padding, 19 bytes 994f1da3826e90a4: T= 0.161378, cwin: 16823,flight: 403,nb_ret: 0,rtt_min: 31361,rtt: 33163,rtt_var: 13047,max_ack_delay: 0,state: 14 994f1da3826e90a4: Sending 55 bytes to 193.167.100.100:443 at T=0.161378 (371bc2df) 994f1da3826e90a4: Receiving 1054 bytes from 193.167.100.100:443 at T=0.192998 (371c3e63) 994f1da3826e90a4: Receiving packet type: 6 (1rtt protected), S0, Q0, 994f1da3826e90a4: <2c2ab63d4a17ee1d>, Seq: 7 (7), Phi: 0, 994f1da3826e90a4: Decrypted 1028 bytes 994f1da3826e90a4: stream 0, offset 0, length 1024, fin = 1: cb25824c352252dd... 994f1da3826e90a4: T= 0.192998, cwin: 16823,flight: 403,nb_ret: 0,rtt_min: 31361,rtt: 33163,rtt_var: 13047,max_ack_delay: 0,state: 14 994f1da3826e90a4: All done, Closing the connection. 994f1da3826e90a4: Sending packet type: 6 (1rtt protected), S1, Q1, 994f1da3826e90a4: , Seq: 7 (7), Phi: 0, 994f1da3826e90a4: Prepared 13 bytes 994f1da3826e90a4: ack_ecn (nb=1), 4-7, 0-1, ect0=6, ect1=0, ce=0 994f1da3826e90a4: application_close, Error 0x0000, Reason length 0 994f1da3826e90a4: Sending 39 bytes to 193.167.100.100:443 at T=0.193283 (371c3f80) 994f1da3826e90a4: Receiving 40 bytes from 193.167.100.100:443 at T=0.224007 (371cb784) 994f1da3826e90a4: Receiving packet type: 6 (1rtt protected), S1, Q0, 994f1da3826e90a4: <2c2ab63d4a17ee1d>, Seq: 8 (8), Phi: 0, 994f1da3826e90a4: Decrypted 14 bytes 994f1da3826e90a4: ack_ecn (nb=1), 5-7, 2, ect0=0, ect1=6, ce=0 994f1da3826e90a4: connection_close, Error 0x0000, Reason length 0 994f1da3826e90a4: Out of 1 zero RTT packets, 1 were acked by the server. 994f1da3826e90a4: Received 1024 bytes in 0.224202 seconds, 0.036538 Mbps. 994f1da3826e90a4: Sent 17 bytes in 0.224202 seconds, 0.000607 Mbps.