D:\QUIC\cronet toy client server>adb -s R3CR90YJQCL shell /data/data/cronet/quic_client --host=192.168.69.39 --port=4567 --disable_certificate_verification --ignore_errors --v=1 https://www.example.org/ [0228/164430.051220:VERBOSE1:quic_packet_creator.cc(176)] Client: Updating packet creator max packet length from 0 to 1250 [0228/164430.051423:VERBOSE1:quic_connection.cc(351)] Client: Created connection with server connection ID 7665a5b6d053e6ba and version: RFCv1 [0228/164430.051434:VERBOSE1:quic_connection.cc(6050)] Client: connection 7665a5b6d053e6ba supports multiple packet number spaces [0228/164430.051441:VERBOSE1:crypto_utils.cc(286)] Creating client crypters for version RFCv1 with CID 7665a5b6d053e6ba [0228/164430.051472:VERBOSE1:quic_framer.cc(4178)] Client: Setting encrypter at level ENCRYPTION_INITIAL [0228/164430.051478:VERBOSE1:quic_framer.cc(4088)] Client: Installing decrypter at level ENCRYPTION_INITIAL [0228/164430.051498:VERBOSE1:quic_flow_controller.cc(58)] Client: Created flow controller for connection, setting initial receive window offset to: 15728640, max receive window to: 15728640, max receive window limit to: 25165824, setting send window offset to: 0 [0228/164430.051541:VERBOSE1:http2_frame_decoder_adapter.cc(247)] Http2DecoderAdapter ctor [0228/164430.051547:VERBOSE1:quic_connection.cc(6216)] Client: setting client connection ID to 0 for connection with server connection ID 7665a5b6d053e6ba [0228/164430.051699:VERBOSE1:quic_flow_controller.cc(58)] Client: Created flow controller for stream 2, setting initial receive window offset to: 6291456, max receive window to: 6291456, max receive window limit to: 16777216, setting send window offset to: 0 [0228/164430.051709:VERBOSE1:quic_stream.cc(832)] Client: Done reading from stream 2 [0228/164430.051721:VERBOSE1:quic_session.cc(1918)] Client: num_streams: 0. activating stream 2 [0228/164430.051730:VERBOSE1:quic_flow_controller.cc(58)] Client: Created flow controller for stream 6, setting initial receive window offset to: 6291456, max receive window to: 6291456, max receive window limit to: 16777216, setting send window offset to: 0 [0228/164430.051736:VERBOSE1:quic_stream.cc(832)] Client: Done reading from stream 6 [0228/164430.051741:VERBOSE1:quic_session.cc(1918)] Client: num_streams: 1. activating stream 6 [0228/164430.051747:VERBOSE1:quic_flow_controller.cc(58)] Client: Created flow controller for stream 10, setting initial receive window offset to: 6291456, max receive window to: 6291456, max receive window limit to: 16777216, setting send window offset to: 0 [0228/164430.051753:VERBOSE1:quic_stream.cc(832)] Client: Done reading from stream 10 [0228/164430.051758:VERBOSE1:quic_session.cc(1918)] Client: num_streams: 2. activating stream 10 [0228/164430.051771:VERBOSE1:tls_client_handshaker.cc(236)] Client using ALPN: 'h3' [0228/164430.051797:VERBOSE1:transport_parameters.cc(1220)] Serialized [Client legacy[version 00000001] [chosen_version 00000001 other_versions 00000001] max_idle_timeout 600000 max_udp_payload_size 1472 initial_max_data 15728640 initial_max_stream_data_bidi_local 6291456 initial_max_stream_data_bidi_remote 6291456 initial_max_stream_data_uni 6291456 initial_max_streams_bidi 100 initial_max_streams_uni 103 initial_source_connection_id 0 max_datagram_frame_size 65536] as 89 bytes [0228/164430.051816:VERBOSE1:tls_handshaker.cc(100)] TlsClient: Continuing handshake [0228/164430.051913:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_INITIAL to ENCRYPTION_INITIAL [0228/164430.051969:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:10, bytes_in_flight:0, lumpy_tokens:0 [0228/164430.051998:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { CRYPTO_FRAME } { level: ENCRYPTION_INITIAL, offset: 0, length: 277 } [0228/164430.052045:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 1: COALESCE of ENCRYPTION_INITIAL [0228/164430.052079:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: 7665a5b6d053e6ba (present), source_connection_id: 0 (present), packet_number_length: 1, reset_flag: 0, version_flag: 1, version: 0, long_packet_type: INITIAL, retry_token_length_length: 1, length_length: 2, packet_number: 1 } [0228/164430.052130:VERBOSE1:quic_connection.cc(3367)] Client: Sending packet 1 : data bearing , encryption level: ENCRYPTION_INITIAL, encrypted length:316, fate: COALESCE to peer 192.168.69.39:4567 [0228/164430.052171:VERBOSE1:quic_coalesced_packet.cc(66)] Successfully coalesced packet: encryption_level: ENCRYPTION_INITIAL, encrypted_length: 316, current length: 0, max_packet_length: 1250 [0228/164430.052210:VERBOSE1:quic_connection.cc(3448)] Client: Trying to set soft max packet length to 934 [0228/164430.052247:VERBOSE1:quic_packet_creator.cc(222)] Client: Setting soft max packet length to: 934 [0228/164430.052307:VERBOSE1:quic_network_blackhole_detector.cc(122)] Updating alarm. next_deadline:0, path_degrading_deadline_:0, path_mtu_reduction_deadline_:0, blackhole_deadline_:0 [0228/164430.052345:VERBOSE1:quic_connection.cc(3579)] Client: time we began writing last sent packet: 28427765086 [0228/164430.052391:VERBOSE1:quic_packet_creator.cc(1928)] Client: Restoring max packet length to: 1250 [0228/164430.052425:VERBOSE1:quic_packet_creator.cc(176)] Client: Updating packet creator max packet length from 934 to 1250 [0228/164430.052463:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { CRYPTO_FRAME } { level: ENCRYPTION_INITIAL, offset: 0, length: 277 } [0228/164430.052502:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { PADDING_FRAME } { num_padding_bytes: 934 } [0228/164430.052540:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 1: COALESCE of ENCRYPTION_INITIAL [0228/164430.052585:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: 7665a5b6d053e6ba (present), source_connection_id: 0 (present), packet_number_length: 1, reset_flag: 0, version_flag: 1, version: 0, long_packet_type: INITIAL, retry_token_length_length: 1, length_length: 2, packet_number: 1 } [0228/164430.052634:VERBOSE1:quic_packet_creator.cc(1183)] Client: Successfully serialized coalesced packet of length: 1250 [0228/164430.052670:VERBOSE1:quic_connection.cc(5979)] Client: Sending coalesced packet total_length: 1250 padding_size: 934 packets: {ENCRYPTION_INITIAL} [0228/164430.052844:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_INITIAL to ENCRYPTION_INITIAL [0228/164430.352221:VERBOSE1:quic_sent_packet_manager.cc(756)] Client: PTO mode [0228/164430.352302:VERBOSE1:quic_sent_packet_manager.cc(865)] Client: Marking 1 for probing retransmission [0228/164430.352314:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_INITIAL to ENCRYPTION_INITIAL [0228/164430.352326:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type PTO_RETRANSMISSION: type { CRYPTO_FRAME } { level: ENCRYPTION_INITIAL, offset: 0, length: 277 } [0228/164430.352339:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 3: COALESCE of ENCRYPTION_INITIAL [0228/164430.352348:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: 7665a5b6d053e6ba (present), source_connection_id: 0 (present), packet_number_length: 1, reset_flag: 0, version_flag: 1, version: 0, long_packet_type: INITIAL, retry_token_length_length: 1, length_length: 2, packet_number: 3 } [0228/164430.352369:VERBOSE1:quic_connection.cc(3367)] Client: Sending packet 3 : data bearing , encryption level: ENCRYPTION_INITIAL, encrypted length:316, fate: COALESCE to peer 192.168.69.39:4567 [0228/164430.352381:VERBOSE1:quic_coalesced_packet.cc(66)] Successfully coalesced packet: encryption_level: ENCRYPTION_INITIAL, encrypted_length: 316, current length: 0, max_packet_length: 1250 [0228/164430.352388:VERBOSE1:quic_connection.cc(3448)] Client: Trying to set soft max packet length to 934 [0228/164430.352393:VERBOSE1:quic_packet_creator.cc(222)] Client: Setting soft max packet length to: 934 [0228/164430.352401:VERBOSE1:quic_network_blackhole_detector.cc(122)] Updating alarm. next_deadline:0, path_degrading_deadline_:0, path_mtu_reduction_deadline_:0, blackhole_deadline_:0 [0228/164430.352408:VERBOSE1:quic_connection.cc(3579)] Client: time we began writing last sent packet: 28428065296 [0228/164430.352420:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_INITIAL to ENCRYPTION_INITIAL [0228/164430.352425:VERBOSE1:quic_packet_creator.cc(1928)] Client: Restoring max packet length to: 1250 [0228/164430.352430:VERBOSE1:quic_packet_creator.cc(176)] Client: Updating packet creator max packet length from 934 to 1250 [0228/164430.352436:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type PTO_RETRANSMISSION: type { CRYPTO_FRAME } { level: ENCRYPTION_INITIAL, offset: 0, length: 277 } [0228/164430.352442:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type PTO_RETRANSMISSION: type { PADDING_FRAME } { num_padding_bytes: 934 } [0228/164430.352448:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 3: COALESCE of ENCRYPTION_INITIAL [0228/164430.352459:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: 7665a5b6d053e6ba (present), source_connection_id: 0 (present), packet_number_length: 1, reset_flag: 0, version_flag: 1, version: 0, long_packet_type: INITIAL, retry_token_length_length: 1, length_length: 2, packet_number: 3 } [0228/164430.352471:VERBOSE1:quic_packet_creator.cc(1183)] Client: Successfully serialized coalesced packet of length: 1250 [0228/164430.352476:VERBOSE1:quic_connection.cc(5979)] Client: Sending coalesced packet total_length: 1250 padding_size: 934 packets: {ENCRYPTION_INITIAL} [0228/164430.363262:VERBOSE1:quic_connection.cc(2728)] Client: time of last received packet: 28428076174 from peer 192.168.69.39:4567, to 192.168.69.15:39450 [0228/164430.363281:VERBOSE1:quic_framer.cc(1470)] Client: Processing IETF QUIC packet. [0228/164430.363292:VERBOSE1:quic_connection.cc(982)] Client: Accepting packet with new connection ID c15955503c69a9d85b instead of 7665a5b6d053e6ba [0228/164430.363301:VERBOSE1:quic_connection.cc(4481)] Client: Queueing coalesced packet. [0228/164430.363310:VERBOSE1:quic_connection.cc(982)] Client: Accepting packet with new connection ID c15955503c69a9d85b instead of 7665a5b6d053e6ba [0228/164430.363328:VERBOSE1:quic_connection.cc(3020)] Client: Replacing connection ID 7665a5b6d053e6ba with c15955503c69a9d85b [0228/164430.363337:VERBOSE1:quic_connection.cc(1303)] Client: Received packet header: { destination_connection_id: 0 (present), source_connection_id: c15955503c69a9d85b (present), packet_number_length: 4, reset_flag: 0, version_flag: 1, version: RFCv1, long_packet_type: INITIAL, retry_token_length_length: 1, length_length: 2, remaining_packet_length: 114, packet_number: 3 } [0228/164430.363363:VERBOSE1:quic_stream_sequencer_buffer.cc(228)] Write at offset: 0 length: 90 [0228/164430.363370:VERBOSE1:quic_stream_sequencer_buffer.cc(329)] Got only a single block with index: 0 [0228/164430.363378:VERBOSE1:tls_handshaker.cc(100)] TlsClient: Continuing handshake [0228/164430.363511:VERBOSE1:tls_handshaker.cc(265)] TlsClient: SetWriteSecret level=ENCRYPTION_HANDSHAKE [0228/164430.363538:VERBOSE1:quic_framer.cc(4178)] Client: Setting encrypter at level ENCRYPTION_HANDSHAKE [0228/164430.363544:VERBOSE1:quic_session.cc(1703)] Client: Set default encryption level to ENCRYPTION_HANDSHAKE [0228/164430.363549:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_INITIAL to ENCRYPTION_HANDSHAKE [0228/164430.363554:VERBOSE1:tls_handshaker.cc(291)] TlsClient: SetReadSecret level=ENCRYPTION_HANDSHAKE, connection_closed=0 [0228/164430.363566:VERBOSE1:quic_framer.cc(4088)] Client: Installing decrypter at level ENCRYPTION_HANDSHAKE [0228/164430.363574:VERBOSE1:quic_stream_sequencer_buffer.cc(75)] Retired block with index: 0 [0228/164430.363580:VERBOSE1:quic_connection.cc(2177)] Client: Got ENCRYPTION_INITIAL packet 3 for c15955503c69a9d85b [0228/164430.363587:VERBOSE1:quic_connection.cc(4500)] Client: Processing coalesced packet [0228/164430.363591:VERBOSE1:quic_framer.cc(1470)] Client: Processing IETF QUIC packet. [0228/164430.363600:VERBOSE1:quic_connection.cc(1303)] Client: Received packet header: { destination_connection_id: 0 (present), source_connection_id: c15955503c69a9d85b (present), packet_number_length: 4, reset_flag: 0, version_flag: 1, version: RFCv1, long_packet_type: HANDSHAKE, length_length: 2, remaining_packet_length: 1069, packet_number: 4 } [0228/164430.363608:VERBOSE1:quic_stream_sequencer_buffer.cc(228)] Write at offset: 0 length: 1038 [0228/164430.363614:VERBOSE1:quic_stream_sequencer_buffer.cc(329)] Got only a single block with index: 0 [0228/164430.363618:VERBOSE1:tls_handshaker.cc(100)] TlsClient: Continuing handshake [0228/164430.363649:VERBOSE1:quic_stream_sequencer_buffer.cc(75)] Retired block with index: 0 [0228/164430.363656:VERBOSE1:quic_connection.cc(2177)] Client: Got ENCRYPTION_HANDSHAKE packet 4 for c15955503c69a9d85b [0228/164430.363664:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:8, bytes_in_flight:632, lumpy_tokens:0 [0228/164430.364276:VERBOSE1:quic_connection.cc(5808)] Client: Trying to send all pending ACKs [0228/164430.364292:VERBOSE1:quic_connection.cc(5838)] Client: Sending ACK of packet number space INITIAL_DATA [0228/164430.364297:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_HANDSHAKE to ENCRYPTION_INITIAL [0228/164430.364303:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { ACK_FRAME } { largest_acked: 3, ack_delay_time: 1045, packets: [ 3 ], received_packets: [ ], ecn_counters_populated: 0 } [0228/164430.364313:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_INITIAL to ENCRYPTION_HANDSHAKE [0228/164430.364318:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 4: COALESCE of ENCRYPTION_INITIAL [0228/164430.364324:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: c15955503c69a9d85b (present), source_connection_id: 0 (present), packet_number_length: 1, reset_flag: 0, version_flag: 1, version: 0, long_packet_type: INITIAL, retry_token_length_length: 1, length_length: 2, packet_number: 4 } [0228/164430.364334:VERBOSE1:quic_connection.cc(3367)] Client: Sending packet 4 : ack or probing only , encryption level: ENCRYPTION_INITIAL, encrypted length:42, fate: COALESCE to peer 192.168.69.39:4567 [0228/164430.364341:VERBOSE1:quic_coalesced_packet.cc(66)] Successfully coalesced packet: encryption_level: ENCRYPTION_INITIAL, encrypted_length: 42, current length: 0, max_packet_length: 1250 [0228/164430.364346:VERBOSE1:quic_connection.cc(3448)] Client: Trying to set soft max packet length to 1208 [0228/164430.364351:VERBOSE1:quic_packet_creator.cc(222)] Client: Setting soft max packet length to: 1208 [0228/164430.364356:VERBOSE1:quic_connection.cc(3579)] Client: time we began writing last sent packet: 28428077257 [0228/164430.364363:VERBOSE1:quic_connection.cc(5838)] Client: Sending ACK of packet number space HANDSHAKE_DATA [0228/164430.364367:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_HANDSHAKE to ENCRYPTION_HANDSHAKE [0228/164430.364372:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { ACK_FRAME } { largest_acked: 4, ack_delay_time: 1114, packets: [ 4 ], received_packets: [ ], ecn_counters_populated: 0 } [0228/164430.364379:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_HANDSHAKE to ENCRYPTION_HANDSHAKE [0228/164430.364384:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 5: COALESCE of ENCRYPTION_HANDSHAKE [0228/164430.364388:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: c15955503c69a9d85b (present), source_connection_id: 0 (present), packet_number_length: 1, reset_flag: 0, version_flag: 1, version: 0, long_packet_type: HANDSHAKE, length_length: 2, packet_number: 5 } [0228/164430.364396:VERBOSE1:quic_packet_creator.cc(1928)] Client: Restoring max packet length to: 1250 [0228/164430.364401:VERBOSE1:quic_packet_creator.cc(176)] Client: Updating packet creator max packet length from 1208 to 1250 [0228/164430.364406:VERBOSE1:quic_connection.cc(3367)] Client: Sending packet 5 : ack or probing only , encryption level: ENCRYPTION_HANDSHAKE, encrypted length:41, fate: COALESCE to peer 192.168.69.39:4567 [0228/164430.364412:VERBOSE1:quic_coalesced_packet.cc(66)] Successfully coalesced packet: encryption_level: ENCRYPTION_HANDSHAKE, encrypted_length: 41, current length: 42, max_packet_length: 1250 [0228/164430.364417:VERBOSE1:quic_connection.cc(3448)] Client: Trying to set soft max packet length to 1167 [0228/164430.364422:VERBOSE1:quic_packet_creator.cc(222)] Client: Setting soft max packet length to: 1167 [0228/164430.364426:VERBOSE1:quic_connection.cc(3579)] Client: time we began writing last sent packet: 28428077328 [0228/164430.364432:VERBOSE1:quic_packet_creator.cc(1928)] Client: Restoring max packet length to: 1250 [0228/164430.364437:VERBOSE1:quic_packet_creator.cc(176)] Client: Updating packet creator max packet length from 1167 to 1250 [0228/164430.364441:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { ACK_FRAME } { largest_acked: 3, ack_delay_time: 1045, packets: [ 3 ], received_packets: [ ], ecn_counters_populated: 0 } [0228/164430.364448:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { PADDING_FRAME } { num_padding_bytes: 1167 } [0228/164430.364453:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 4: COALESCE of ENCRYPTION_INITIAL [0228/164430.364458:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: c15955503c69a9d85b (present), source_connection_id: 0 (present), packet_number_length: 1, reset_flag: 0, version_flag: 1, version: 0, long_packet_type: INITIAL, retry_token_length_length: 1, length_length: 2, packet_number: 4 } [0228/164430.364469:VERBOSE1:quic_packet_creator.cc(1183)] Client: Successfully serialized coalesced packet of length: 1250 [0228/164430.364473:VERBOSE1:quic_connection.cc(5979)] Client: Sending coalesced packet total_length: 1250 padding_size: 1167 packets: {ENCRYPTION_INITIAL, ENCRYPTION_HANDSHAKE} [0228/164430.364502:VERBOSE1:quic_session.cc(1805)] Client: Discarding ENCRYPTION_INITIAL keys [0228/164430.364508:VERBOSE1:quic_framer.cc(4183)] Client: Removing encrypter of ENCRYPTION_INITIAL [0228/164430.364535:VERBOSE1:quic_framer.cc(4094)] Client: Removing decrypter at level ENCRYPTION_INITIAL [0228/164430.372924:VERBOSE1:quic_connection.cc(2728)] Client: time of last received packet: 28428085838 from peer 192.168.69.39:4567, to 192.168.69.15:39450 [0228/164430.372938:VERBOSE1:quic_framer.cc(1470)] Client: Processing IETF QUIC packet. [0228/164430.372945:VERBOSE1:quic_framer.cc(4333)] Client: No decrypter available for removing header protection at level ENCRYPTION_INITIAL [0228/164430.372950:VERBOSE1:quic_connection.cc(2559)] Client: Received undecryptable packet of length 1220 without key at level ENCRYPTION_INITIAL while connection is at encryption level ENCRYPTION_HANDSHAKE [0228/164430.372965:VERBOSE1:quic_framer.cc(5921)] Client: Error: QUIC_DECRYPTION_FAILURE detail: Unable to decrypt ENCRYPTION_INITIAL header protection (missing key). [0228/164430.372971:VERBOSE1:quic_connection.cc(2737)] Client: Unable to process packet. Last packet processed: uninitialized [0228/164430.377362:VERBOSE1:quic_connection.cc(2728)] Client: time of last received packet: 28428090277 from peer 192.168.69.39:4567, to 192.168.69.15:39450 [0228/164430.377380:VERBOSE1:quic_framer.cc(1470)] Client: Processing IETF QUIC packet. [0228/164430.377402:VERBOSE1:quic_connection.cc(1303)] Client: Received packet header: { destination_connection_id: 0 (present), source_connection_id: c15955503c69a9d85b (present), packet_number_length: 4, reset_flag: 0, version_flag: 1, version: RFCv1, long_packet_type: HANDSHAKE, length_length: 2, remaining_packet_length: 336, packet_number: 6 } [0228/164430.377413:VERBOSE1:quic_connection.cc(1430)] Client: OnAckFrameStart, largest_acked: 5 [0228/164430.377419:VERBOSE1:quic_connection.cc(1466)] Client: OnAckRange: [5, 6) [0228/164430.377425:VERBOSE1:quic_connection.cc(1505)] Client: OnAckFrameEnd, start: 5 [0228/164430.377430:VERBOSE1:quic_sent_packet_manager.cc(1368)] Client: Got an ENCRYPTION_HANDSHAKE ack for packet 5 , state: OUTSTANDING [0228/164430.377440:VERBOSE1:hybrid_slow_start.cc(49)] Reset hybrid slow start @3 [0228/164430.377446:VERBOSE1:quic_sustained_bandwidth_recorder.cc(36)] Started recording at: 28428090277 [0228/164430.377455:VERBOSE1:quic_stream_sequencer_buffer.cc(228)] Write at offset: 1038 length: 306 [0228/164430.377461:VERBOSE1:quic_stream_sequencer_buffer.cc(329)] Got only a single block with index: 0 [0228/164430.377466:VERBOSE1:tls_handshaker.cc(100)] TlsClient: Continuing handshake [0228/164430.377474:VERBOSE1:tls_handshaker.cc(233)] VerifyCert: peer cert_chain length: 1 [0228/164430.377559:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_HANDSHAKE to ENCRYPTION_HANDSHAKE [0228/164430.377566:VERBOSE1:quic_connection.cc(3205)] Client: Bundle an ACK opportunistically [0228/164430.377572:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { ACK_FRAME } { largest_acked: 6, ack_delay_time: 211, packets: [ 4 6 ], received_packets: [ ], ecn_counters_populated: 0 } [0228/164430.377581:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:8, bytes_in_flight:0, lumpy_tokens:0 [0228/164430.377587:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { CRYPTO_FRAME } { level: ENCRYPTION_HANDSHAKE, offset: 0, length: 52 } [0228/164430.377594:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 6: COALESCE of ENCRYPTION_HANDSHAKE [0228/164430.377599:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: c15955503c69a9d85b (present), source_connection_id: 0 (present), packet_number_length: 1, reset_flag: 0, version_flag: 1, version: 0, long_packet_type: HANDSHAKE, length_length: 2, packet_number: 6 } [0228/164430.377610:VERBOSE1:quic_connection.cc(3367)] Client: Sending packet 6 : data bearing , encryption level: ENCRYPTION_HANDSHAKE, encrypted length:97, fate: COALESCE to peer 192.168.69.39:4567 [0228/164430.377616:VERBOSE1:quic_coalesced_packet.cc(66)] Successfully coalesced packet: encryption_level: ENCRYPTION_HANDSHAKE, encrypted_length: 97, current length: 0, max_packet_length: 1250 [0228/164430.377622:VERBOSE1:quic_connection.cc(3448)] Client: Trying to set soft max packet length to 1153 [0228/164430.377626:VERBOSE1:quic_packet_creator.cc(222)] Client: Setting soft max packet length to: 1153 [0228/164430.377633:VERBOSE1:quic_network_blackhole_detector.cc(122)] Updating alarm. next_deadline:0, path_degrading_deadline_:0, path_mtu_reduction_deadline_:0, blackhole_deadline_:0 [0228/164430.377639:VERBOSE1:quic_connection.cc(3579)] Client: time we began writing last sent packet: 28428090532 [0228/164430.377646:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_HANDSHAKE to ENCRYPTION_HANDSHAKE [0228/164430.377651:VERBOSE1:tls_handshaker.cc(265)] TlsClient: SetWriteSecret level=ENCRYPTION_FORWARD_SECURE [0228/164430.377664:VERBOSE1:quic_framer.cc(4178)] Client: Setting encrypter at level ENCRYPTION_FORWARD_SECURE [0228/164430.377669:VERBOSE1:quic_session.cc(1703)] Client: Set default encryption level to ENCRYPTION_FORWARD_SECURE [0228/164430.377674:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_HANDSHAKE to ENCRYPTION_FORWARD_SECURE [0228/164430.377694:VERBOSE1:quic_send_control_stream.cc(73)] Control stream 2 is writing settings frame SETTINGS_MAX_FIELD_SECTION_SIZE = 131072; SETTINGS_QPACK_BLOCKED_STREAMS = 100; SETTINGS_QPACK_MAX_TABLE_CAPACITY = 65536; UNSUPPORTED_SETTINGS_TYPE(66312155678) = 3479815819; [0228/164430.377705:VERBOSE1:quic_session.cc(1805)] Client: Discarding ENCRYPTION_ZERO_RTT keys [0228/164430.377710:VERBOSE1:quic_framer.cc(4183)] Client: Removing encrypter of ENCRYPTION_ZERO_RTT [0228/164430.377715:VERBOSE1:tls_handshaker.cc(291)] TlsClient: SetReadSecret level=ENCRYPTION_FORWARD_SECURE, connection_closed=0 [0228/164430.377726:VERBOSE1:quic_framer.cc(4088)] Client: Installing decrypter at level ENCRYPTION_FORWARD_SECURE [0228/164430.377740:VERBOSE1:tls_client_handshaker.cc(523)] Client: handshake finished [0228/164430.377753:VERBOSE1:transport_parameters.cc(1532)] Parsed transport parameters [Server original_destination_connection_id 7665a5b6d053e6ba max_idle_timeout 30000 stateless_reset_token 666da10c47db3af0ae895dbd975dafa5 max_udp_payload_size 1472 initial_max_data 16777216 initial_max_stream_data_bidi_local 65536 initial_max_stream_data_bidi_remote 65536 initial_max_stream_data_uni 65536 initial_max_streams_bidi 100 initial_max_streams_uni 100 ack_delay_exponent 8 max_ack_delay 26 active_connection_id_limit 4 initial_source_connection_id c15955503c69a9d85b 0xff03de1a=43e8 0x2ab2=] from 104 bytes [0228/164430.377771:VERBOSE1:quic_session.cc(1205)] Client: OnConfigNegotiated [0228/164430.377787:VERBOSE1:quic_framer.cc(4099)] Client: SetKeyUpdateSupportForConnection: 1 [0228/164430.377795:VERBOSE1:quic_session.cc(1226)] Client: Setting Bidirectional outgoing_max_streams_ to 100 [0228/164430.377801:VERBOSE1:quic_session.cc(1284)] Client: Setting Unidirectional outgoing_max_streams_ to 100 [0228/164430.377807:VERBOSE1:quic_session.cc(1558)] Client: OnNewStreamOutgoingBidirectionalFlowControlWindow 65536 [0228/164430.377814:VERBOSE1:quic_session.cc(1589)] Client: OnNewStreamIncomingBidirectionalFlowControlWindow 65536 [0228/164430.377819:VERBOSE1:quic_session.cc(1528)] Client: OnNewStreamUnidirectionalFlowControlWindow 65536 [0228/164430.377824:VERBOSE1:quic_session.cc(1546)] Client: Informing unidirectional stream 10 of new stream flow control window 65536 [0228/164430.377829:VERBOSE1:quic_flow_controller.cc(260)] Client: UpdateSendWindowOffset for stream 10 with new offset 65536 current offset: 0 bytes_sent: 0 [0228/164430.377837:VERBOSE1:quic_session.cc(2206)] Client: Adding stream 10 to write-blocked list [0228/164430.377842:VERBOSE1:quic_session.cc(1546)] Client: Informing unidirectional stream 2 of new stream flow control window 65536 [0228/164430.377847:VERBOSE1:quic_flow_controller.cc(260)] Client: UpdateSendWindowOffset for stream 2 with new offset 65536 current offset: 0 bytes_sent: 0 [0228/164430.377852:VERBOSE1:quic_session.cc(2206)] Client: Adding stream 2 to write-blocked list [0228/164430.377857:VERBOSE1:quic_session.cc(1546)] Client: Informing unidirectional stream 6 of new stream flow control window 65536 [0228/164430.377862:VERBOSE1:quic_flow_controller.cc(260)] Client: UpdateSendWindowOffset for stream 6 with new offset 65536 current offset: 0 bytes_sent: 0 [0228/164430.377867:VERBOSE1:quic_session.cc(2206)] Client: Adding stream 6 to write-blocked list [0228/164430.377872:VERBOSE1:quic_session.cc(1618)] Client: OnNewSessionFlowControlWindow 16777216 [0228/164430.377876:VERBOSE1:quic_flow_controller.cc(260)] Client: UpdateSendWindowOffset for connection with new offset 16777216 current offset: 0 bytes_sent: 0 [0228/164430.377883:VERBOSE1:quic_session.cc(2722)] Client: ALPN selected: h3 [0228/164430.377888:VERBOSE1:tls_client_handshaker.cc(557)] Client: server selected ALPN: 'h3' [0228/164430.377894:VERBOSE1:quic_stream_sequencer_buffer.cc(75)] Retired block with index: 0 [0228/164430.377900:VERBOSE1:quic_connection.cc(2177)] Client: Got ENCRYPTION_HANDSHAKE packet 6 for c15955503c69a9d85b [0228/164430.377907:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:9, bytes_in_flight:97, lumpy_tokens:0 [0228/164430.377913:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:9, bytes_in_flight:97, lumpy_tokens:0 [0228/164430.377919:VERBOSE1:quic_session.cc(729)] Client: Removing stream 2 from write-blocked list [0228/164430.377924:VERBOSE1:quic_session.cc(737)] Client: stream 2 bytes_written 0 fin 0 [0228/164430.377930:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_FORWARD_SECURE to ENCRYPTION_FORWARD_SECURE [0228/164430.377936:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:9, bytes_in_flight:97, lumpy_tokens:0 [0228/164430.377942:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { STREAM_FRAME } { stream_id: 2, fin: 0, offset: 0, length: 41 } [0228/164430.377957:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_FORWARD_SECURE to ENCRYPTION_FORWARD_SECURE [0228/164430.377968:VERBOSE1:quic_flow_controller.cc(107)] Client: stream 2 sent 41 bytes. [0228/164430.377972:VERBOSE1:quic_flow_controller.cc(107)] Client: connection sent 41 bytes. [0228/164430.377977:VERBOSE1:quic_stream.cc(1256)] Client: stream 2 sends 41 bytes and has buffered data 0 bytes. fin is sent: 0 fin is buffered: 0 [0228/164430.377984:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:9, bytes_in_flight:97, lumpy_tokens:0 [0228/164430.377989:VERBOSE1:quic_session.cc(729)] Client: Removing stream 6 from write-blocked list [0228/164430.377993:VERBOSE1:quic_session.cc(737)] Client: stream 6 bytes_written 0 fin 0 [0228/164430.377998:VERBOSE1:quic_session.cc(605)] Client: Suspected busy loop on stream id 6 stream_bytes_written 0 fin 0 count 1 [0228/164430.378004:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:9, bytes_in_flight:97, lumpy_tokens:0 [0228/164430.378009:VERBOSE1:quic_session.cc(729)] Client: Removing stream 10 from write-blocked list [0228/164430.378013:VERBOSE1:quic_session.cc(737)] Client: stream 10 bytes_written 0 fin 0 [0228/164430.378018:VERBOSE1:quic_session.cc(605)] Client: Suspected busy loop on stream id 10 stream_bytes_written 0 fin 0 count 1 [0228/164430.378025:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 7: COALESCE of ENCRYPTION_FORWARD_SECURE [0228/164430.378030:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: c15955503c69a9d85b (present), source_connection_id: 0 (absent), packet_number_length: 1, reset_flag: 0, version_flag: 0, packet_number: 7 } [0228/164430.378039:VERBOSE1:quic_packet_creator.cc(1928)] Client: Restoring max packet length to: 1250 [0228/164430.378044:VERBOSE1:quic_packet_creator.cc(176)] Client: Updating packet creator max packet length from 1153 to 1250 [0228/164430.378049:VERBOSE1:quic_connection.cc(3367)] Client: Sending packet 7 : data bearing , encryption level: ENCRYPTION_FORWARD_SECURE, encrypted length:70, fate: COALESCE to peer 192.168.69.39:4567 [0228/164430.378056:VERBOSE1:quic_coalesced_packet.cc(66)] Successfully coalesced packet: encryption_level: ENCRYPTION_FORWARD_SECURE, encrypted_length: 70, current length: 97, max_packet_length: 1250 [0228/164430.378061:VERBOSE1:quic_connection.cc(3448)] Client: Trying to set soft max packet length to 1083 [0228/164430.378066:VERBOSE1:quic_packet_creator.cc(222)] Client: Setting soft max packet length to: 1083 [0228/164430.378070:VERBOSE1:quic_network_blackhole_detector.cc(122)] Updating alarm. next_deadline:0, path_degrading_deadline_:0, path_mtu_reduction_deadline_:0, blackhole_deadline_:0 [0228/164430.378076:VERBOSE1:quic_connection.cc(3579)] Client: time we began writing last sent packet: 28428090972 [0228/164430.378081:VERBOSE1:quic_connection.cc(3629)] Client: lowest_packet_sent_in_current_key_phase_ = 7 [0228/164430.378087:VERBOSE1:quic_packet_creator.cc(1928)] Client: Restoring max packet length to: 1250 [0228/164430.378092:VERBOSE1:quic_packet_creator.cc(176)] Client: Updating packet creator max packet length from 1083 to 1250 [0228/164430.378097:VERBOSE1:quic_packet_creator.cc(1183)] Client: Successfully serialized coalesced packet of length: 167 [0228/164430.378101:VERBOSE1:quic_connection.cc(5979)] Client: Sending coalesced packet total_length: 167 padding_size: 0 packets: {ENCRYPTION_HANDSHAKE, ENCRYPTION_FORWARD_SECURE} Connected to 192.168.69.39:4567 [0228/164430.378202:VERBOSE1:http_header_block.cc(144)] Inserting: (:method, GET) [0228/164430.378213:VERBOSE1:http_header_block.cc(144)] Inserting: (:scheme, https) [0228/164430.378218:VERBOSE1:http_header_block.cc(144)] Inserting: (:authority, www.example.org) [0228/164430.378224:VERBOSE1:http_header_block.cc(144)] Inserting: (:path, /) [0228/164430.378233:VERBOSE1:http_header_block.cc(144)] Inserting: (:method, GET) [0228/164430.378238:VERBOSE1:http_header_block.cc(144)] Inserting: (:scheme, https) [0228/164430.378243:VERBOSE1:http_header_block.cc(144)] Inserting: (:authority, www.example.org) [0228/164430.378248:VERBOSE1:http_header_block.cc(144)] Inserting: (:path, /) [0228/164430.378257:VERBOSE1:quic_flow_controller.cc(58)] Client: Created flow controller for stream 0, setting initial receive window offset to: 6291456, max receive window to: 6291456, max receive window limit to: 16777216, setting send window offset to: 65536 [0228/164430.378271:VERBOSE1:quic_session.cc(1918)] Client: num_streams: 3. activating stream 0 [0228/164430.378322:VERBOSE1:quic_spdy_stream.cc(1225)] Client: Stream 0 is writing HEADERS frame header of length 2, and payload of length 19 with fin 1 [0228/164430.378337:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_FORWARD_SECURE to ENCRYPTION_FORWARD_SECURE [0228/164430.378343:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:8, bytes_in_flight:167, lumpy_tokens:0 [0228/164430.378350:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { STREAM_FRAME } { stream_id: 0, fin: 1, offset: 0, length: 21 } [0228/164430.378357:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_FORWARD_SECURE to ENCRYPTION_FORWARD_SECURE [0228/164430.378362:VERBOSE1:quic_flow_controller.cc(107)] Client: stream 0 sent 21 bytes. [0228/164430.378366:VERBOSE1:quic_flow_controller.cc(107)] Client: connection sent 62 bytes. [0228/164430.378371:VERBOSE1:quic_stream.cc(1256)] Client: stream 0 sends 21 bytes and has buffered data 0 bytes. fin is sent: 1 fin is buffered: 1 [0228/164430.378376:VERBOSE1:quic_stream.cc(848)] Client: Done writing to stream 0 [0228/164430.378411:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 8: COALESCE of ENCRYPTION_FORWARD_SECURE [0228/164430.378423:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: c15955503c69a9d85b (present), source_connection_id: 0 (absent), packet_number_length: 1, reset_flag: 0, version_flag: 0, packet_number: 8 } [0228/164430.378432:VERBOSE1:quic_connection.cc(3367)] Client: Sending packet 8 : data bearing , encryption level: ENCRYPTION_FORWARD_SECURE, encrypted length:50, fate: COALESCE to peer 192.168.69.39:4567 [0228/164430.378439:VERBOSE1:quic_coalesced_packet.cc(66)] Successfully coalesced packet: encryption_level: ENCRYPTION_FORWARD_SECURE, encrypted_length: 50, current length: 0, max_packet_length: 1250 [0228/164430.378444:VERBOSE1:quic_connection.cc(3448)] Client: Trying to set soft max packet length to 1200 [0228/164430.378449:VERBOSE1:quic_packet_creator.cc(222)] Client: Setting soft max packet length to: 1200 [0228/164430.378454:VERBOSE1:quic_network_blackhole_detector.cc(122)] Updating alarm. next_deadline:0, path_degrading_deadline_:0, path_mtu_reduction_deadline_:0, blackhole_deadline_:0 [0228/164430.378459:VERBOSE1:quic_connection.cc(3579)] Client: time we began writing last sent packet: 28428091355 [0228/164430.378472:VERBOSE1:quic_packet_creator.cc(1928)] Client: Restoring max packet length to: 1250 [0228/164430.378477:VERBOSE1:quic_packet_creator.cc(176)] Client: Updating packet creator max packet length from 1200 to 1250 [0228/164430.378482:VERBOSE1:quic_packet_creator.cc(1183)] Client: Successfully serialized coalesced packet of length: 50 [0228/164430.378487:VERBOSE1:quic_connection.cc(5979)] Client: Sending coalesced packet total_length: 50 padding_size: 0 packets: {ENCRYPTION_FORWARD_SECURE} [0228/164430.391228:VERBOSE1:quic_connection.cc(2728)] Client: time of last received packet: 28428104141 from peer 192.168.69.39:4567, to 192.168.69.15:39450 [0228/164430.391251:VERBOSE1:quic_framer.cc(1470)] Client: Processing IETF QUIC packet. [0228/164430.391261:VERBOSE1:quic_framer.cc(4576)] Client: packet 7 received key_phase=0 current_key_phase_bit_=0 [0228/164430.391280:VERBOSE1:quic_framer.cc(4661)] Client: current_key_phase_first_received_packet_number_ = 7 [0228/164430.391285:VERBOSE1:quic_connection.cc(2292)] Client: OnDecryptedFirstPacketInKeyPhase [0228/164430.391296:VERBOSE1:quic_connection.cc(1303)] Client: Received packet header: { destination_connection_id: 0 (present), source_connection_id: 0 (absent), packet_number_length: 4, reset_flag: 0, version_flag: 0, packet_number: 7 } [0228/164430.391306:VERBOSE1:quic_connection.cc(1430)] Client: OnAckFrameStart, largest_acked: 8 [0228/164430.391311:VERBOSE1:rtt_stats.cc(92)] smoothed_rtt(us):12928 mean_deviation(us):4896 [0228/164430.391316:VERBOSE1:quic_connection.cc(1466)] Client: OnAckRange: [7, 9) [0228/164430.391322:VERBOSE1:quic_connection.cc(1505)] Client: OnAckFrameEnd, start: 7 [0228/164430.391326:VERBOSE1:quic_sent_packet_manager.cc(1368)] Client: Got an ENCRYPTION_FORWARD_SECURE ack for packet 7 , state: OUTSTANDING [0228/164430.391340:VERBOSE1:quic_sent_packet_manager.cc(1368)] Client: Got an ENCRYPTION_FORWARD_SECURE ack for packet 8 , state: OUTSTANDING [0228/164430.391346:VERBOSE1:quic_stream.cc(1084)] Client: stream 2 Acking [0, 41] fin = 0 [0228/164430.391355:VERBOSE1:quic_stream.cc(1084)] Client: stream 0 Acking [0, 21] fin = 1 [0228/164430.391364:VERBOSE1:hybrid_slow_start.cc(49)] Reset hybrid slow start @8 [0228/164430.391370:VERBOSE1:quic_sustained_bandwidth_recorder.cc(54)] New max bandwidth estimate (KBytes/s): 3613 [0228/164430.391376:VERBOSE1:quic_session.cc(1805)] Client: Discarding ENCRYPTION_HANDSHAKE keys [0228/164430.391380:VERBOSE1:quic_framer.cc(4183)] Client: Removing encrypter of ENCRYPTION_HANDSHAKE [0228/164430.391389:VERBOSE1:quic_framer.cc(4094)] Client: Removing decrypter at level ENCRYPTION_HANDSHAKE [0228/164430.391396:VERBOSE1:quic_session.cc(458)] Client: OnHandshakeDoneReceived [0228/164430.391414:VERBOSE1:quic_connection.cc(2177)] Client: Got ENCRYPTION_FORWARD_SECURE packet 7 for 0 [0228/164430.391421:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:7, bytes_in_flight:0, lumpy_tokens:0 [0228/164430.391453:VERBOSE1:quic_connection.cc(2728)] Client: time of last received packet: 28428104369 from peer 192.168.69.39:4567, to 192.168.69.15:39450 [0228/164430.391460:VERBOSE1:quic_framer.cc(1470)] Client: Processing IETF QUIC packet. [0228/164430.391465:VERBOSE1:quic_framer.cc(4576)] Client: packet 8 received key_phase=0 current_key_phase_bit_=0 [0228/164430.391471:VERBOSE1:quic_connection.cc(1303)] Client: Received packet header: { destination_connection_id: 0 (present), source_connection_id: 0 (absent), packet_number_length: 4, reset_flag: 0, version_flag: 0, packet_number: 8 } [0228/164430.391489:VERBOSE1:quic_connection.cc(2177)] Client: Got ENCRYPTION_FORWARD_SECURE packet 8 for 0 [0228/164430.391494:VERBOSE1:quic_connection.cc(5808)] Client: Trying to send all pending ACKs [0228/164430.391505:VERBOSE1:quic_connection.cc(5838)] Client: Sending ACK of packet number space APPLICATION_DATA [0228/164430.391510:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_FORWARD_SECURE to ENCRYPTION_FORWARD_SECURE [0228/164430.391515:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { ACK_FRAME } { largest_acked: 8, ack_delay_time: 62, packets: [ 7 8 ], received_packets: [ ], ecn_counters_populated: 0 } [0228/164430.391524:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_FORWARD_SECURE to ENCRYPTION_FORWARD_SECURE [0228/164430.391529:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:7, bytes_in_flight:0, lumpy_tokens:0 [0228/164430.391535:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 9: SEND_TO_WRITER of ENCRYPTION_FORWARD_SECURE [0228/164430.391540:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: c15955503c69a9d85b (present), source_connection_id: 0 (absent), packet_number_length: 1, reset_flag: 0, version_flag: 0, packet_number: 9 } [0228/164430.391549:VERBOSE1:quic_connection.cc(3367)] Client: Sending packet 9 : ack or probing only , encryption level: ENCRYPTION_FORWARD_SECURE, encrypted length:32, fate: SEND_TO_WRITER to peer 192.168.69.39:4567 [0228/164430.391579:VERBOSE1:quic_connection.cc(3579)] Client: time we began writing last sent packet: 28428104472 [0228/164430.392331:VERBOSE1:quic_connection.cc(2728)] Client: time of last received packet: 28428105246 from peer 192.168.69.39:4567, to 192.168.69.15:39450 [0228/164430.392348:VERBOSE1:quic_framer.cc(1470)] Client: Processing IETF QUIC packet. [0228/164430.392354:VERBOSE1:quic_framer.cc(4576)] Client: packet 9 received key_phase=0 current_key_phase_bit_=0 [0228/164430.392370:VERBOSE1:quic_connection.cc(1303)] Client: Received packet header: { destination_connection_id: 0 (present), source_connection_id: 0 (absent), packet_number_length: 4, reset_flag: 0, version_flag: 0, packet_number: 9 } [0228/164430.392380:VERBOSE1:quic_stream_sequencer_buffer.cc(228)] Write at offset: 0 length: 305 [0228/164430.392386:VERBOSE1:quic_stream_sequencer_buffer.cc(329)] Got only a single block with index: 0 [0228/164430.392405:VERBOSE1:tls_client_handshaker.cc(636)] No session cache, not inserting a session [0228/164430.392412:VERBOSE1:quic_stream_sequencer_buffer.cc(75)] Retired block with index: 0 [0228/164430.392417:VERBOSE1:quic_connection.cc(2177)] Client: Got ENCRYPTION_FORWARD_SECURE packet 9 for 0 [0228/164430.392424:VERBOSE1:pacing_sender.cc(159)] Sending packet now. burst_tokens:7, bytes_in_flight:0, lumpy_tokens:0 [0228/164430.392441:VERBOSE1:quic_connection.cc(2728)] Client: time of last received packet: 28428105357 from peer 192.168.69.39:4567, to 192.168.69.15:39450 [0228/164430.392447:VERBOSE1:quic_framer.cc(1470)] Client: Processing IETF QUIC packet. [0228/164430.392452:VERBOSE1:quic_framer.cc(4576)] Client: packet 10 received key_phase=0 current_key_phase_bit_=0 [0228/164430.392458:VERBOSE1:quic_connection.cc(1303)] Client: Received packet header: { destination_connection_id: 0 (present), source_connection_id: 0 (absent), packet_number_length: 4, reset_flag: 0, version_flag: 0, packet_number: 10 } [0228/164430.392466:VERBOSE1:quic_connection.cc(1646)] Client: STOP_SENDING frame received for stream: 2 with error: 7 [0228/164430.392474:VERBOSE1:quic_connection.cc(4539)] Client: Closing connection: c15955503c69a9d85b, with error: QUIC_HTTP_CLOSED_CRITICAL_STREAM (156), and details: STOP_SENDING received for send control stream [0228/164430.392481:VERBOSE1:quic_connection.cc(4602)] Client: Sending connection close packet at level: ENCRYPTION_FORWARD_SECURE [0228/164430.392486:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_FORWARD_SECURE to ENCRYPTION_FORWARD_SECURE [0228/164430.392491:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { ACK_FRAME } { largest_acked: 10, ack_delay_time: 50, packets: [ 7 8 9 10 ], received_packets: [ ], ecn_counters_populated: 0 } [0228/164430.392499:VERBOSE1:quic_packet_creator.cc(1764)] Client: Adding frame with transmission type NOT_RETRANSMISSION: type { CONNECTION_CLOSE_FRAME } { Close type: IETF_QUIC_APPLICATION_CONNECTION_CLOSE, wire_error_code: 260, quic_error_code: QUIC_HTTP_CLOSED_CRITICAL_STREAM, error_details: 'STOP_SENDING received for send control stream'} [0228/164430.392508:VERBOSE1:quic_packet_creator.cc(832)] Client: fate of packet 10: SEND_TO_WRITER of ENCRYPTION_FORWARD_SECURE [0228/164430.392513:VERBOSE1:quic_framer.cc(2012)] Client: Appending IETF header: { destination_connection_id: c15955503c69a9d85b (present), source_connection_id: 0 (absent), packet_number_length: 1, reset_flag: 0, version_flag: 0, packet_number: 10 } [0228/164430.392523:VERBOSE1:quic_connection.cc(3367)] Client: Sending packet 10 : data bearing , encryption level: ENCRYPTION_FORWARD_SECURE, encrypted length:85, fate: SEND_TO_WRITER to peer 192.168.69.39:4567 [0228/164430.392544:VERBOSE1:quic_connection.cc(3579)] Client: time we began writing last sent packet: 28428105446 [0228/164430.392552:VERBOSE1:quic_connection.cc(4300)] Client: Setting default encryption level from ENCRYPTION_FORWARD_SECURE to ENCRYPTION_FORWARD_SECURE [0228/164430.392561:VERBOSE1:quic_stream.cc(832)] Client: Done reading from stream 0 [0228/164430.392566:VERBOSE1:quic_stream.cc(838)] Client: Closing stream 0 [0228/164430.392570:VERBOSE1:quic_session.cc(1053)] Client: Closing stream: 0 [0228/164430.392591:VERBOSE1:quic_flow_controller.cc(69)] Client: connection consumed 0 bytes. [0228/164430.392599:ERROR:quic_spdy_client_base.cc(73)] Missing :status response header [0228/164430.392608:VERBOSE1:quic_connection.cc(4673)] Cancelling all QuicConnection alarms. [0228/164430.392633:VERBOSE1:quic_framer.cc(3046)] Visitor asked to stop further processing. Request: headers: { :method GET :scheme https :authority www.example.org :path / } body: Response: headers: {} body: trailers: {} early data accepted: 0 Request failed (-1). [0228/164430.392679:VERBOSE1:quic_toy_client.cc(499)] Request completed with TTFB(us): 9223372036854775807, TTLB(us): 9223372036854775807 Request caused connection failure. Error: QUIC_HTTP_CLOSED_CRITICAL_STREAM [0228/164430.392859:VERBOSE1:statistics_recorder.cc(604)] Collections of all histograms Histogram: Net.QuicConnection.WritePacketStatus recorded 9 samples, mean = 0.0 (flags = 0x1) 0 ---------O (9 = 100.0%) 1 ... Histogram: Net.QuicDroppedPacketReason recorded 1 samples, mean = 6.0 (flags = 0x1) 0 ... 6 -O (1 = 100.0%) {0.0%} 7 O (0 = 0.0%) {100.0%} Histogram: Net.QuicSession.AsyncRead recorded 7 samples, mean = 0.7 (flags = 0x1) 0 --O (2 = 28.6%) 1 -----O (5 = 71.4%) {28.6%} 2 O (0 = 0.0%) {100.0%} Histogram: Net.QuicSession.CoalesceStreamFrameStatus recorded 2 samples, mean = 0.0 (flags = 0x1) 0 --O (2 = 100.0%) 1 ... Histogram: Net.QuicSession.HeaderCompressionRatioQpackSent recorded 1 samples, mean = 35.0 (flags = 0x1) 0 ... 35 -O (1 = 100.0%) {0.0%} 36 ... Histogram: Net.QuicSession.NumQueuedPacketsBeforeWrite recorded 6 samples, mean = 0.0 (flags = 0x1) 0 ------O (6 = 100.0%) 1 ... Histogram: Net.QuicSession.PacketWriteTime.Synchronous recorded 7 samples, mean = 0.0 (flags = 0x1) 0 -------O (7 = 100.0%) 1 ... Histogram: Net.QuicSession.Qpack.HeaderListCountWhenInsertionNotBlocked recorded 1 samples, mean = 1.0 (flags = 0x1) 0 O (0 = 0.0%) 1 -O (1 = 100.0%) {0.0%} 2 ... Histogram: Net.QuicSession.Qpack.HeaderListCountWhenNotBlockedStreamLimited recorded 1 samples, mean = 1.0 (flags = 0x1) 0 O (0 = 0.0%) 1 -O (1 = 100.0%) {0.0%} 2 ...